0}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 675.171160][T19304] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 675.173226][T19304] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:15 executing program 3: syz_clone(0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") [ 675.193258][T19310] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 675.199845][T19310] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:15 executing program 0: syz_clone(0x8101800, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x20000000, &(0x7f0000000000)="8bb6f25f1e87cd1ede1b445baec56094a09f2cdf8ee983aebde6c9d8d1c26f65c82d049243e145a6bf9a72450bff8801443878c681cccb8de8f8dc9dfb15f3b4d49c3f8ca762c7c56a397f901990d44477d610390ca26e79cd087bd60702ba5c9d605e058ac3e4a80da6b6f0e9bac2ed6a8ac61b906e4036571874e723788d2b17d9856fcdc18315121c83669efe6c25369897dd2cde78acda161726ff5757f665d1f4561038045804280233e612d955e66109616f0ebdb2636e70a5ff883bbcf51c6feac10845e40971cc219f28065094ee760e59cd38d00bbdf67f2046052e370ab742c764", 0xe6, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:15 executing program 3: syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:15 executing program 3: syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:11:15 executing program 0: syz_clone(0x20000000, &(0x7f0000000000)="8bb6f25f1e87cd1ede1b445baec56094a09f2cdf8ee983aebde6c9d8d1c26f65c82d049243e145a6bf9a72450bff8801443878c681cccb8de8f8dc9dfb15f3b4d49c3f8ca762c7c56a397f901990d44477d610390ca26e79cd087bd60702ba5c9d605e058ac3e4a80da6b6f0e9bac2ed6a8ac61b906e4036571874e723788d2b17d9856fcdc18315121c83669efe6c25369897dd2cde78acda161726ff5757f665d1f4561038045804280233e612d955e66109616f0ebdb2636e70a5ff883bbcf51c6feac10845e40971cc219f28065094ee760e59cd38d00bbdf67f2046052e370ab742c764", 0xe6, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:15 executing program 3: syz_clone(0x20000000, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:15 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x0, 0x0, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:15 executing program 2: syz_usb_connect$cdc_ncm(0x6, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x80, 0x9, 0xfa}}, {{0x9, 0x5, 0x3, 0x2, 0x20, 0x64, 0x4, 0x40}}}}}}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x201, 0x3f, 0x3f, 0xa4, 0xd7, 0x8}, 0x23, &(0x7f0000000140)={0x5, 0xf, 0x23, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xb, 0x20, 0xba, 0x5}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "9e1b5322b7a1c0f434bd767aaa6f2908"}]}, 0x2, [{0x72, &(0x7f0000000180)=@string={0x72, 0x3, "149ac0e56ced4838aae5126dbca1592de69aef30475297407e8426bc95de9aa3f8dacce9a27202e5ed26e73cab4647ed131140d4268b38646e90082110d337494da308ff8e46d0d8b9b1d4ffaf10785b1130f2d6e172cfdae25d8a85d21e64b124f86f7aaf135a0fc78d2a334c2a7061"}}, {0x31, &(0x7f0000000200)=@string={0x31, 0x3, "cf0bb485219dd7f26b74a022be974cc2c5e4ef0c28652487f6d5105d5d4f94a8a31dd50a0c2fb3646c77f46578e06a"}}]}) 00:11:15 executing program 0: syz_clone(0x20000000, &(0x7f0000000000)="8bb6f25f1e87cd1ede1b445baec56094a09f2cdf8ee983aebde6c9d8d1c26f65c82d049243e145a6bf9a72450bff8801443878c681cccb8de8f8dc9dfb15f3b4d49c3f8ca762c7c56a397f901990d44477d610390ca26e79cd087bd60702ba5c9d605e058ac3e4a80da6b6f0e9bac2ed6a8ac61b906e4036571874e723788d2b17d9856fcdc18315121c83669efe6c25369897dd2cde78acda161726ff5757f665d1f4561038045804280233e612d955e66109616f0ebdb2636e70a5ff883bbcf51c6feac10845e40971cc219f28065094ee760e59cd38d00bbdf67f2046052e370ab742c764", 0xe6, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:15 executing program 3: syz_clone(0x0, &(0x7f0000000000)="8bb6f25f1e87cd1ede1b445baec56094a09f2cdf8ee983aebde6c9d8d1c26f65c82d049243e145a6bf9a72450bff8801443878c681cccb8de8f8dc9dfb15f3b4d49c3f8ca762c7c56a397f901990d44477d610390ca26e79cd087bd60702ba5c9d605e058ac3e4a80da6b6f0e9bac2ed6a8ac61b906e4036571874e723788d2b17d9856fcdc18315121c83669efe6c25369897dd2cde78acda161726ff5757f665d1f4561038045804280233e612d955e66109616f0ebdb2636e70a5ff883bbcf51c6feac10845e40971cc219f28065094ee760e59cd38d00bbdf67f2046052e370ab742c764", 0xe6, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:15 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x81, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6f, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@acm={0x4, 0x24, 0x2, 0x8}, @dmm={0x7, 0x24, 0x14, 0x40, 0xea94}, @mbim_extended={0x8, 0x24, 0x1c, 0x6, 0x3, 0x40}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x5, 0x1, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:15 executing program 5: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 675.750529][T19337] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 675.752533][T19337] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 675.755912][T19340] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 675.769030][T19340] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:15 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000001480)={r3, 0x5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001200)={'gretap0\x00', &(0x7f00000011c0)={'erspan0\x00', 0x0, 0x700, 0x10, 0x6, 0x6, {{0x6, 0x4, 0x2, 0x9, 0x18, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010100, {[@generic={0x44, 0x2}]}}}}}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001300)={&(0x7f00000012c0)='./file0\x00', 0x0, 0x10}, 0x10) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001340), 0x80000, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001380)={0xffffffffffffffff, 0x7ff, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', r4, 0x22, r5, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, r6, 0x1, r7, r0, r8, r0, r9]}, 0x80) 00:11:15 executing program 0: syz_clone(0x0, &(0x7f0000000000)="8bb6f25f1e87cd1ede1b445baec56094a09f2cdf8ee983aebde6c9d8d1c26f65c82d049243e145a6bf9a72450bff8801443878c681cccb8de8f8dc9dfb15f3b4d49c3f8ca762c7c56a397f901990d44477d610390ca26e79cd087bd60702ba5c9d605e058ac3e4a80da6b6f0e9bac2ed6a8ac61b906e4036571874e723788d2b17d9856fcdc18315121c83669efe6c25369897dd2cde78acda161726ff5757f665d1f4561038045804280233e612d955e66109616f0ebdb2636e70a5ff883bbcf51c6feac10845e40971cc219f28065094ee760e59cd38d00bbdf67f2046052e370ab742c764", 0xe6, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:15 executing program 0: syz_clone(0x0, &(0x7f0000000000)="8bb6f25f1e87cd1ede1b445baec56094a09f2cdf8ee983aebde6c9d8d1c26f65c82d049243e145a6bf9a72450bff8801443878c681cccb8de8f8dc9dfb15f3b4d49c3f8ca762c7c56a397f901990d44477d610390ca26e79cd087bd60702ba5c9d605e058ac3e4a80da6b6f0e9bac2ed6a8ac61b906e4036571874e723788d2b17d9856fcdc18315121c83669efe6c25369897dd2cde78acda161726ff5757f665d1f4561038045804280233e612d955e66109616f0ebdb2636e70a5ff883bbcf51c6feac10845e40971cc219f28065094ee760e59cd38d00bbdf67f2046052e370ab742c764", 0xe6, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:15 executing program 0: syz_clone(0x0, &(0x7f0000000000)="8bb6f25f1e87cd1ede1b445baec56094a09f2cdf8ee983aebde6c9d8d1c26f65c82d049243e145a6bf9a72450bff8801443878c681cccb8de8f8dc9dfb15f3b4d49c3f8ca762c7c56a397f901990d44477d610390ca26e79cd087bd60702ba5c9d605e058ac3e4a80da6b6f0e9bac2ed6a8ac61b906e4036571874e723788d2b17d9856fcdc18315121c83669efe6c25369897dd2cde78acda161726ff5757f665d1f4561038045804280233e612d955e66109616f0ebdb2636e70a5ff883bbcf51c6feac10845e40971cc219f28065094ee760e59cd38d00bbdf67f2046052e370ab742c764", 0xe6, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:15 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000001480)={r3, 0x5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001200)={'gretap0\x00', &(0x7f00000011c0)={'erspan0\x00', 0x0, 0x700, 0x10, 0x6, 0x6, {{0x6, 0x4, 0x2, 0x9, 0x18, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010100, {[@generic={0x44, 0x2}]}}}}}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001300)={&(0x7f00000012c0)='./file0\x00', 0x0, 0x10}, 0x10) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001340), 0x80000, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001380)={0xffffffffffffffff, 0x7ff, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', r4, 0x22, r5, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, r6, 0x1, r7, r0, r8, r0, r9]}, 0x80) 00:11:15 executing program 0: syz_clone(0x20000000, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:16 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x79, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x67, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@acm={0x4, 0x24, 0x2, 0x8}, @dmm={0x7, 0x24, 0x14, 0x40, 0xea94}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x5, 0x1, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 676.245912][T19362] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 676.248082][T19362] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:16 executing program 2: syz_usb_connect$cdc_ncm(0x6, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x80, 0x9, 0xfa}}, {{0x9, 0x5, 0x3, 0x2, 0x20, 0x64, 0x4, 0x40}}}}}}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x201, 0x3f, 0x3f, 0xa4, 0xd7, 0x8}, 0x23, &(0x7f0000000140)={0x5, 0xf, 0x23, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xb, 0x20, 0xba, 0x5}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "9e1b5322b7a1c0f434bd767aaa6f2908"}]}, 0x2, [{0x72, &(0x7f0000000180)=@string={0x72, 0x3, "149ac0e56ced4838aae5126dbca1592de69aef30475297407e8426bc95de9aa3f8dacce9a27202e5ed26e73cab4647ed131140d4268b38646e90082110d337494da308ff8e46d0d8b9b1d4ffaf10785b1130f2d6e172cfdae25d8a85d21e64b124f86f7aaf135a0fc78d2a334c2a7061"}}, {0x31, &(0x7f0000000200)=@string={0x31, 0x3, "cf0bb485219dd7f26b74a022be974cc2c5e4ef0c28652487f6d5105d5d4f94a8a31dd50a0c2fb3646c77f46578e06a"}}]}) 00:11:16 executing program 0: syz_clone(0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:16 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000001480)={r3, 0x5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001200)={'gretap0\x00', &(0x7f00000011c0)={'erspan0\x00', 0x0, 0x700, 0x10, 0x6, 0x6, {{0x6, 0x4, 0x2, 0x9, 0x18, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010100, {[@generic={0x44, 0x2}]}}}}}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001300)={&(0x7f00000012c0)='./file0\x00', 0x0, 0x10}, 0x10) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001340), 0x80000, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001380)={0xffffffffffffffff, 0x7ff, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', r4, 0x22, r5, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, r6, 0x1, r7, r0, r8, r0, r9]}, 0x80) 00:11:16 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x79, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x67, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@acm={0x4, 0x24, 0x2, 0x8}, @dmm={0x7, 0x24, 0x14, 0x40, 0xea94}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x5, 0x1, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:16 executing program 5: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x0, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 676.319563][T19368] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 676.333361][T19370] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 676.333510][T19368] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 676.335525][T19370] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:16 executing program 0: syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:16 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000001480)={r3, 0x5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001200)={'gretap0\x00', &(0x7f00000011c0)={'erspan0\x00', 0x0, 0x700, 0x10, 0x6, 0x6, {{0x6, 0x4, 0x2, 0x9, 0x18, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010100, {[@generic={0x44, 0x2}]}}}}}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001300)={&(0x7f00000012c0)='./file0\x00', 0x0, 0x10}, 0x10) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001340), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', r4, 0x22, r5, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, r6, 0x1, r7, r0, r8, r0, 0xffffffffffffffff]}, 0x80) 00:11:16 executing program 0: syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:11:16 executing program 0: syz_clone(0x0, &(0x7f0000000000)="8bb6f25f1e87cd1ede1b445baec56094a09f2cdf8ee983aebde6c9d8d1c26f65c82d049243e145a6bf9a72450bff8801443878c681cccb8de8f8dc9dfb15f3b4d49c3f8ca762c7c56a397f901990d44477d610390ca26e79cd087bd60702ba5c9d605e058ac3e4a80da6b6f0e9bac2ed6a8ac61b906e4036571874e723788d2b17d9856fcdc18315121c83669efe6c25369897dd2cde78acda161726ff5757f665d1f4561038045804280233e612d955e66109616f0ebdb2636e70a5ff883bbcf51c6feac10845e40971cc219f28065094ee760e59cd38d00bbdf67f2046052e370ab742c764", 0xe6, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d68d6e117c01ba2004ea3c20919a258b0bd7d799e4d45f7d9081dba56b99976a699d4b41b6d706600b815c7fe714d3aeeb23f71d013378d22b46ec52f07159a41ec3192f55c5384b0841b89c66b12542977fddc4be") 00:11:16 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000001480)={r3, 0x5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001200)={'gretap0\x00', &(0x7f00000011c0)={'erspan0\x00', 0x0, 0x700, 0x10, 0x6, 0x6, {{0x6, 0x4, 0x2, 0x9, 0x18, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010100, {[@generic={0x44, 0x2}]}}}}}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001300)={&(0x7f00000012c0)='./file0\x00', 0x0, 0x10}, 0x10) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', r4, 0x22, r5, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, r6, 0x1, r7, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 00:11:16 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000040)={0x0, 0xfa}) 00:11:16 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x72, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x60, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@acm={0x4, 0x24, 0x2, 0x8}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x5, 0x1, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 676.776355][T19390] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 676.779018][T19390] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:16 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000040)={0x0, 0xfa}) 00:11:16 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000001480)={r3, 0x5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001200)={'gretap0\x00', &(0x7f00000011c0)={'erspan0\x00', 0x0, 0x700, 0x10, 0x6, 0x6, {{0x6, 0x4, 0x2, 0x9, 0x18, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010100, {[@generic={0x44, 0x2}]}}}}}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001300)={&(0x7f00000012c0)='./file0\x00', 0x0, 0x10}, 0x10) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', r4, 0x22, r5, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, r6, 0x1, r7, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 00:11:16 executing program 2: syz_usb_connect$cdc_ncm(0x6, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x9, 0xfa}}, {{0x9, 0x5, 0x3, 0x2, 0x20, 0x64, 0x4, 0x40}}}}}}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x201, 0x3f, 0x3f, 0xa4, 0xd7, 0x8}, 0x23, &(0x7f0000000140)={0x5, 0xf, 0x23, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xb, 0x20, 0xba, 0x5}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "9e1b5322b7a1c0f434bd767aaa6f2908"}]}, 0x2, [{0x72, &(0x7f0000000180)=@string={0x72, 0x3, "149ac0e56ced4838aae5126dbca1592de69aef30475297407e8426bc95de9aa3f8dacce9a27202e5ed26e73cab4647ed131140d4268b38646e90082110d337494da308ff8e46d0d8b9b1d4ffaf10785b1130f2d6e172cfdae25d8a85d21e64b124f86f7aaf135a0fc78d2a334c2a7061"}}, {0x31, &(0x7f0000000200)=@string={0x31, 0x3, "cf0bb485219dd7f26b74a022be974cc2c5e4ef0c28652487f6d5105d5d4f94a8a31dd50a0c2fb3646c77f46578e06a"}}]}) 00:11:16 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x72, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x60, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@acm={0x4, 0x24, 0x2, 0x8}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x5, 0x1, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:16 executing program 5: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:16 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000040)={0x0, 0xfa}) [ 676.898963][T19397] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 676.907782][T19397] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:16 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000001480)={r3, 0x5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001200)={'gretap0\x00', &(0x7f00000011c0)={'erspan0\x00', 0x0, 0x700, 0x10, 0x6, 0x6, {{0x6, 0x4, 0x2, 0x9, 0x18, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010100, {[@generic={0x44, 0x2}]}}}}}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001300)={&(0x7f00000012c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', r4, 0x22, r5, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, r6, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) [ 676.923138][T19401] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 676.930957][T19401] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:16 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000040)={0x0, 0xfa}) 00:11:16 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000040)={0x0, 0xfa}) 00:11:16 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000040)={0x0, 0xfa}) 00:11:16 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000001480)={r3, 0x5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001200)={'gretap0\x00', &(0x7f00000011c0)={'erspan0\x00', 0x0, 0x700, 0x10, 0x6, 0x6, {{0x6, 0x4, 0x2, 0x9, 0x18, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010100, {[@generic={0x44, 0x2}]}}}}}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', r4, 0x22, r5, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 00:11:17 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000040)={0x0, 0xfa}) 00:11:17 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000001480)={r3, 0x5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001200)={'gretap0\x00', &(0x7f00000011c0)={'erspan0\x00', 0x0, 0x700, 0x10, 0x6, 0x6, {{0x6, 0x4, 0x2, 0x9, 0x18, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010100, {[@generic={0x44, 0x2}]}}}}}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', r4, 0x22, r5, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 00:11:17 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x5, 0x1, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 677.341733][T19418] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 677.348429][T19418] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:17 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000001480)={r3, 0x5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001200)={'gretap0\x00', &(0x7f00000011c0)={'erspan0\x00', 0x0, 0x700, 0x10, 0x6, 0x6, {{0x6, 0x4, 0x2, 0x9, 0x18, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010100, {[@generic={0x44, 0x2}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', r4, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 00:11:17 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x5, 0x1, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:17 executing program 5: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:17 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000040)={0x0, 0xfa}) 00:11:17 executing program 2: syz_usb_connect$cdc_ncm(0x6, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x0, 0xfa}}, {{0x9, 0x5, 0x3, 0x2, 0x20, 0x64, 0x4, 0x40}}}}}}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x201, 0x3f, 0x3f, 0xa4, 0xd7, 0x8}, 0x23, &(0x7f0000000140)={0x5, 0xf, 0x23, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xb, 0x20, 0xba, 0x5}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "9e1b5322b7a1c0f434bd767aaa6f2908"}]}, 0x2, [{0x72, &(0x7f0000000180)=@string={0x72, 0x3, "149ac0e56ced4838aae5126dbca1592de69aef30475297407e8426bc95de9aa3f8dacce9a27202e5ed26e73cab4647ed131140d4268b38646e90082110d337494da308ff8e46d0d8b9b1d4ffaf10785b1130f2d6e172cfdae25d8a85d21e64b124f86f7aaf135a0fc78d2a334c2a7061"}}, {0x31, &(0x7f0000000200)=@string={0x31, 0x3, "cf0bb485219dd7f26b74a022be974cc2c5e4ef0c28652487f6d5105d5d4f94a8a31dd50a0c2fb3646c77f46578e06a"}}]}) [ 677.459664][T19425] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 677.461921][T19425] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:17 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000040)={0x0, 0xfa}) 00:11:17 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000001480)={r3, 0x5}) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) [ 677.501069][T19428] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 677.514168][T19428] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:17 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000040)={0x0, 0xfa}) 00:11:17 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, 0x0) 00:11:17 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000001480)={r3, 0x5}) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 00:11:17 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, 0x0) 00:11:17 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x5, 0x1, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:17 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, 0x0) [ 677.882358][T19444] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 677.884414][T19444] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:17 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x5, 0x1, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 677.988432][T19446] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 677.990432][T19446] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:18 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 00:11:18 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000040)) 00:11:18 executing program 2: syz_usb_connect$cdc_ncm(0x6, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x20, 0x64, 0x4, 0x40}}}}}}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x201, 0x3f, 0x3f, 0xa4, 0xd7, 0x8}, 0x23, &(0x7f0000000140)={0x5, 0xf, 0x23, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xb, 0x20, 0xba, 0x5}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "9e1b5322b7a1c0f434bd767aaa6f2908"}]}, 0x2, [{0x72, &(0x7f0000000180)=@string={0x72, 0x3, "149ac0e56ced4838aae5126dbca1592de69aef30475297407e8426bc95de9aa3f8dacce9a27202e5ed26e73cab4647ed131140d4268b38646e90082110d337494da308ff8e46d0d8b9b1d4ffaf10785b1130f2d6e172cfdae25d8a85d21e64b124f86f7aaf135a0fc78d2a334c2a7061"}}, {0x31, &(0x7f0000000200)=@string={0x31, 0x3, "cf0bb485219dd7f26b74a022be974cc2c5e4ef0c28652487f6d5105d5d4f94a8a31dd50a0c2fb3646c77f46578e06a"}}]}) 00:11:18 executing program 5: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x0, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 678.060436][T19454] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 00:11:18 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, 0x0) [ 678.062902][T19454] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:18 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) fsmount(r1, 0x0, 0x1) socket$can_bcm(0x1d, 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 00:11:18 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, 0x0) 00:11:18 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, 0x0) 00:11:18 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) fsmount(r1, 0x0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 00:11:18 executing program 0: ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 00:11:18 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 00:11:18 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x1, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:18 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x1, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:18 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) [ 678.511084][T19472] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 678.512972][T19472] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 678.522448][T19474] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 678.532372][T19474] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:18 executing program 2: syz_usb_connect$cdc_ncm(0x6, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x64, 0x4, 0x40}}}}}}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x201, 0x3f, 0x3f, 0xa4, 0xd7, 0x8}, 0x23, &(0x7f0000000140)={0x5, 0xf, 0x23, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xb, 0x20, 0xba, 0x5}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "9e1b5322b7a1c0f434bd767aaa6f2908"}]}, 0x2, [{0x72, &(0x7f0000000180)=@string={0x72, 0x3, "149ac0e56ced4838aae5126dbca1592de69aef30475297407e8426bc95de9aa3f8dacce9a27202e5ed26e73cab4647ed131140d4268b38646e90082110d337494da308ff8e46d0d8b9b1d4ffaf10785b1130f2d6e172cfdae25d8a85d21e64b124f86f7aaf135a0fc78d2a334c2a7061"}}, {0x31, &(0x7f0000000200)=@string={0x31, 0x3, "cf0bb485219dd7f26b74a022be974cc2c5e4ef0c28652487f6d5105d5d4f94a8a31dd50a0c2fb3646c77f46578e06a"}}]}) 00:11:18 executing program 5: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x0, 0x0, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:18 executing program 0: ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 00:11:18 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 00:11:18 executing program 0: ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 00:11:18 executing program 3: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, r0, 0x0, &(0x7f00000013c0)=[r0, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) [ 678.623510][T19483] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 678.627779][T19483] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:18 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 00:11:18 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 678.917560][ T2151] ieee802154 phy0 wpan0: encryption failed: -22 [ 678.918963][ T2151] ieee802154 phy1 wpan1: encryption failed: -22 00:11:19 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x0, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:19 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 00:11:19 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 679.088428][T19498] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 679.094902][T19498] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:19 executing program 2: syz_usb_connect$cdc_ncm(0x6, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x0, 0x4, 0x40}}}}}}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x201, 0x3f, 0x3f, 0xa4, 0xd7, 0x8}, 0x23, &(0x7f0000000140)={0x5, 0xf, 0x23, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xb, 0x20, 0xba, 0x5}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "9e1b5322b7a1c0f434bd767aaa6f2908"}]}, 0x2, [{0x72, &(0x7f0000000180)=@string={0x72, 0x3, "149ac0e56ced4838aae5126dbca1592de69aef30475297407e8426bc95de9aa3f8dacce9a27202e5ed26e73cab4647ed131140d4268b38646e90082110d337494da308ff8e46d0d8b9b1d4ffaf10785b1130f2d6e172cfdae25d8a85d21e64b124f86f7aaf135a0fc78d2a334c2a7061"}}, {0x31, &(0x7f0000000200)=@string={0x31, 0x3, "cf0bb485219dd7f26b74a022be974cc2c5e4ef0c28652487f6d5105d5d4f94a8a31dd50a0c2fb3646c77f46578e06a"}}]}) 00:11:19 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x0, 0x1f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:19 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 00:11:19 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:19 executing program 5: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 679.161004][T19505] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 679.163169][T19505] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 679.178396][T19508] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 00:11:19 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(r7, &(0x7f0000000380)={0x1, 0x4}, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000002400)={0xec, 0x0, &(0x7f0000002280)=[@release, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x50, 0x18, &(0x7f0000001000)=ANY=[@ANYBLOB="852a646600000400", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r4, @ANYBLOB="0000006f58000000000000008561646600000000060000000000000000000000000000002800000000000000"], &(0x7f0000001080)={0x0, 0x18, 0x30}}}, @decrefs={0x40046307, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f00000020c0)={@ptr={0x70742a85, 0x1, &(0x7f00000010c0)=""/4096, 0x1000, 0x3, 0xc}, @flat=@weak_binder={0x77622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0x100, 0x3}}, &(0x7f0000002140)={0x0, 0x28, 0x40}}}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000002180)=""/21, 0x15, 0x1, 0x13}, @fd={0x66642a85, 0x0, r5}}, &(0x7f0000002240)={0x0, 0x28, 0x50}}}], 0x6c, 0x0, &(0x7f0000002380)="51bd47f3e8b73d84b0b10aa4c918be3474b7af91620c3909e8bd33c9c81a2642db4f284e71da1566ef017916096988c955260bc176c33a7b998c039e54f78d896943890a3b524e09e4e172247223776546ea7f9b40dd07da0d80cd8195743ce8f9c6f82a0d3c3fbd6af199ed"}) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r8) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r9) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000002c0)={'erspan0\x00', &(0x7f0000000280)={'gre0\x00', r6, 0x80, 0x1, 0x1ff, 0x8003, {{0x8, 0x4, 0x1, 0x3, 0x20, 0x66, 0x0, 0x9, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x37}, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) r10 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000240)={r10}) ioctl$SIOCGETSGCNT_IN6(r1, 0x89e1, &(0x7f0000002480)={@mcast1, @private1}) 00:11:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x0, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 679.194449][T19508] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x0, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x0, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:19 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:19 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(r7, &(0x7f0000000380)={0x1, 0x4}, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000002400)={0xec, 0x0, &(0x7f0000002280)=[@release, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x50, 0x18, &(0x7f0000001000)=ANY=[@ANYBLOB="852a646600000400", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r4, @ANYBLOB="0000006f58000000000000008561646600000000060000000000000000000000000000002800000000000000"], &(0x7f0000001080)={0x0, 0x18, 0x30}}}, @decrefs={0x40046307, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f00000020c0)={@ptr={0x70742a85, 0x1, &(0x7f00000010c0)=""/4096, 0x1000, 0x3, 0xc}, @flat=@weak_binder={0x77622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0x100, 0x3}}, &(0x7f0000002140)={0x0, 0x28, 0x40}}}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000002180)=""/21, 0x15, 0x1, 0x13}, @fd={0x66642a85, 0x0, r5}}, &(0x7f0000002240)={0x0, 0x28, 0x50}}}], 0x6c, 0x0, &(0x7f0000002380)="51bd47f3e8b73d84b0b10aa4c918be3474b7af91620c3909e8bd33c9c81a2642db4f284e71da1566ef017916096988c955260bc176c33a7b998c039e54f78d896943890a3b524e09e4e172247223776546ea7f9b40dd07da0d80cd8195743ce8f9c6f82a0d3c3fbd6af199ed"}) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r8) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r9) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000002c0)={'erspan0\x00', &(0x7f0000000280)={'gre0\x00', r6, 0x80, 0x1, 0x1ff, 0x8003, {{0x8, 0x4, 0x1, 0x3, 0x20, 0x66, 0x0, 0x9, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x37}, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) r10 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000240)={r10}) ioctl$SIOCGETSGCNT_IN6(r1, 0x89e1, &(0x7f0000002480)={@mcast1, @private1}) 00:11:19 executing program 2: syz_usb_connect$cdc_ncm(0x6, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x0, 0x0, 0x40}}}}}}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x201, 0x3f, 0x3f, 0xa4, 0xd7, 0x8}, 0x23, &(0x7f0000000140)={0x5, 0xf, 0x23, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xb, 0x20, 0xba, 0x5}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "9e1b5322b7a1c0f434bd767aaa6f2908"}]}, 0x2, [{0x72, &(0x7f0000000180)=@string={0x72, 0x3, "149ac0e56ced4838aae5126dbca1592de69aef30475297407e8426bc95de9aa3f8dacce9a27202e5ed26e73cab4647ed131140d4268b38646e90082110d337494da308ff8e46d0d8b9b1d4ffaf10785b1130f2d6e172cfdae25d8a85d21e64b124f86f7aaf135a0fc78d2a334c2a7061"}}, {0x31, &(0x7f0000000200)=@string={0x31, 0x3, "cf0bb485219dd7f26b74a022be974cc2c5e4ef0c28652487f6d5105d5d4f94a8a31dd50a0c2fb3646c77f46578e06a"}}]}) [ 679.680232][T19523] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 679.683543][T19523] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:19 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:19 executing program 5: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) [ 679.721217][T19529] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 00:11:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 679.728336][T19529] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 679.731278][T19530] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 679.734409][T19530] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca31}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x12, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:19 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(r7, &(0x7f0000000380)={0x1, 0x4}, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000002400)={0xec, 0x0, &(0x7f0000002280)=[@release, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x50, 0x18, &(0x7f0000001000)=ANY=[@ANYBLOB="852a646600000400", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r4, @ANYBLOB="0000006f58000000000000008561646600000000060000000000000000000000000000002800000000000000"], &(0x7f0000001080)={0x0, 0x18, 0x30}}}, @decrefs={0x40046307, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f00000020c0)={@ptr={0x70742a85, 0x1, &(0x7f00000010c0)=""/4096, 0x1000, 0x3, 0xc}, @flat=@weak_binder={0x77622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0x100, 0x3}}, &(0x7f0000002140)={0x0, 0x28, 0x40}}}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000002180)=""/21, 0x15, 0x1, 0x13}, @fd={0x66642a85, 0x0, r5}}, &(0x7f0000002240)={0x0, 0x28, 0x50}}}], 0x6c, 0x0, &(0x7f0000002380)="51bd47f3e8b73d84b0b10aa4c918be3474b7af91620c3909e8bd33c9c81a2642db4f284e71da1566ef017916096988c955260bc176c33a7b998c039e54f78d896943890a3b524e09e4e172247223776546ea7f9b40dd07da0d80cd8195743ce8f9c6f82a0d3c3fbd6af199ed"}) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r8) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r9) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000002c0)={'erspan0\x00', &(0x7f0000000280)={'gre0\x00', r6, 0x80, 0x1, 0x1ff, 0x8003, {{0x8, 0x4, 0x1, 0x3, 0x20, 0x66, 0x0, 0x9, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x37}, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) r10 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000240)={r10}) ioctl$SIOCGETSGCNT_IN6(r1, 0x89e1, &(0x7f0000002480)={@mcast1, @private1}) 00:11:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x10, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0xe, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(r7, &(0x7f0000000380)={0x1, 0x4}, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000002400)={0xec, 0x0, &(0x7f0000002280)=[@release, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x50, 0x18, &(0x7f0000001000)=ANY=[@ANYBLOB="852a646600000400", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r4, @ANYBLOB="0000006f58000000000000008561646600000000060000000000000000000000000000002800000000000000"], &(0x7f0000001080)={0x0, 0x18, 0x30}}}, @decrefs={0x40046307, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f00000020c0)={@ptr={0x70742a85, 0x1, &(0x7f00000010c0)=""/4096, 0x1000, 0x3, 0xc}, @flat=@weak_binder={0x77622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0x100, 0x3}}, &(0x7f0000002140)={0x0, 0x28, 0x40}}}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000002180)=""/21, 0x15, 0x1, 0x13}, @fd={0x66642a85, 0x0, r5}}, &(0x7f0000002240)={0x0, 0x28, 0x50}}}], 0x6c, 0x0, &(0x7f0000002380)="51bd47f3e8b73d84b0b10aa4c918be3474b7af91620c3909e8bd33c9c81a2642db4f284e71da1566ef017916096988c955260bc176c33a7b998c039e54f78d896943890a3b524e09e4e172247223776546ea7f9b40dd07da0d80cd8195743ce8f9c6f82a0d3c3fbd6af199ed"}) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r8) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r9) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000002c0)={'erspan0\x00', &(0x7f0000000280)={'gre0\x00', r6, 0x80, 0x1, 0x1ff, 0x8003, {{0x8, 0x4, 0x1, 0x3, 0x20, 0x66, 0x0, 0x9, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x37}, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) r10 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000240)={r10}) 00:11:20 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:20 executing program 2: syz_usb_connect$cdc_ncm(0x6, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x201, 0x3f, 0x3f, 0xa4, 0xd7, 0x8}, 0x23, &(0x7f0000000140)={0x5, 0xf, 0x23, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xb, 0x20, 0xba, 0x5}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "9e1b5322b7a1c0f434bd767aaa6f2908"}]}, 0x2, [{0x72, &(0x7f0000000180)=@string={0x72, 0x3, "149ac0e56ced4838aae5126dbca1592de69aef30475297407e8426bc95de9aa3f8dacce9a27202e5ed26e73cab4647ed131140d4268b38646e90082110d337494da308ff8e46d0d8b9b1d4ffaf10785b1130f2d6e172cfdae25d8a85d21e64b124f86f7aaf135a0fc78d2a334c2a7061"}}, {0x31, &(0x7f0000000200)=@string={0x31, 0x3, "cf0bb485219dd7f26b74a022be974cc2c5e4ef0c28652487f6d5105d5d4f94a8a31dd50a0c2fb3646c77f46578e06a"}}]}) [ 680.236437][T19548] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 680.246392][T19548] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:20 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0xc, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}, @exit]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0xb, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0x100, 0x8}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 680.296044][T19552] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 00:11:20 executing program 5: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 680.300224][T19552] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 680.310203][T19554] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 680.314600][T19554] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:20 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(r7, &(0x7f0000000380)={0x1, 0x4}, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000002400)={0xec, 0x0, &(0x7f0000002280)=[@release, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x50, 0x18, &(0x7f0000001000)=ANY=[@ANYBLOB="852a646600000400", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r4, @ANYBLOB="0000006f58000000000000008561646600000000060000000000000000000000000000002800000000000000"], &(0x7f0000001080)={0x0, 0x18, 0x30}}}, @decrefs={0x40046307, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f00000020c0)={@ptr={0x70742a85, 0x1, &(0x7f00000010c0)=""/4096, 0x1000, 0x3, 0xc}, @flat=@weak_binder={0x77622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0x100, 0x3}}, &(0x7f0000002140)={0x0, 0x28, 0x40}}}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000002180)=""/21, 0x15, 0x1, 0x13}, @fd={0x66642a85, 0x0, r5}}, &(0x7f0000002240)={0x0, 0x28, 0x50}}}], 0x6c, 0x0, &(0x7f0000002380)="51bd47f3e8b73d84b0b10aa4c918be3474b7af91620c3909e8bd33c9c81a2642db4f284e71da1566ef017916096988c955260bc176c33a7b998c039e54f78d896943890a3b524e09e4e172247223776546ea7f9b40dd07da0d80cd8195743ce8f9c6f82a0d3c3fbd6af199ed"}) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r8) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r9) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000002c0)={'erspan0\x00', &(0x7f0000000280)={'gre0\x00', r6, 0x80, 0x1, 0x1ff, 0x8003, {{0x8, 0x4, 0x1, 0x3, 0x20, 0x66, 0x0, 0x9, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x37}, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) socket$nl_crypto(0x10, 0x3, 0x15) 00:11:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0xa, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x5, 0x5, 0x5, 0xc, 0x4}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x9, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x7, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(r7, &(0x7f0000000380)={0x1, 0x4}, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000002400)={0xec, 0x0, &(0x7f0000002280)=[@release, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x50, 0x18, &(0x7f0000001000)=ANY=[@ANYBLOB="852a646600000400", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r4, @ANYBLOB="0000006f58000000000000008561646600000000060000000000000000000000000000002800000000000000"], &(0x7f0000001080)={0x0, 0x18, 0x30}}}, @decrefs={0x40046307, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f00000020c0)={@ptr={0x70742a85, 0x1, &(0x7f00000010c0)=""/4096, 0x1000, 0x3, 0xc}, @flat=@weak_binder={0x77622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0x100, 0x3}}, &(0x7f0000002140)={0x0, 0x28, 0x40}}}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000002180)=""/21, 0x15, 0x1, 0x13}, @fd={0x66642a85, 0x0, r5}}, &(0x7f0000002240)={0x0, 0x28, 0x50}}}], 0x6c, 0x0, &(0x7f0000002380)="51bd47f3e8b73d84b0b10aa4c918be3474b7af91620c3909e8bd33c9c81a2642db4f284e71da1566ef017916096988c955260bc176c33a7b998c039e54f78d896943890a3b524e09e4e172247223776546ea7f9b40dd07da0d80cd8195743ce8f9c6f82a0d3c3fbd6af199ed"}) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r8) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r9) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r9, 0x89f8, &(0x7f00000002c0)={'erspan0\x00', &(0x7f0000000280)={'gre0\x00', r6, 0x80, 0x1, 0x1ff, 0x8003, {{0x8, 0x4, 0x1, 0x3, 0x20, 0x66, 0x0, 0x9, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x37}, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) 00:11:20 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 680.796376][T19571] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 680.798513][T19571] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:20 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x23, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 2: syz_usb_connect$cdc_ncm(0x6, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) [ 680.832410][T19577] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 680.835239][T19577] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x7, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x7, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x7, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:20 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(r6, &(0x7f0000000380)={0x1, 0x4}, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000002400)={0xec, 0x0, &(0x7f0000002280)=[@release, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x50, 0x18, &(0x7f0000001000)=ANY=[@ANYBLOB="852a646600000400", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r4, @ANYBLOB="0000006f58000000000000008561646600000000060000000000000000000000000000002800000000000000"], &(0x7f0000001080)={0x0, 0x18, 0x30}}}, @decrefs={0x40046307, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f00000020c0)={@ptr={0x70742a85, 0x1, &(0x7f00000010c0)=""/4096, 0x1000, 0x3, 0xc}, @flat=@weak_binder={0x77622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0x100, 0x3}}, &(0x7f0000002140)={0x0, 0x28, 0x40}}}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000002180)=""/21, 0x15, 0x1, 0x13}, @fd={0x66642a85, 0x0, r5}}, &(0x7f0000002240)={0x0, 0x28, 0x50}}}], 0x6c, 0x0, &(0x7f0000002380)="51bd47f3e8b73d84b0b10aa4c918be3474b7af91620c3909e8bd33c9c81a2642db4f284e71da1566ef017916096988c955260bc176c33a7b998c039e54f78d896943890a3b524e09e4e172247223776546ea7f9b40dd07da0d80cd8195743ce8f9c6f82a0d3c3fbd6af199ed"}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r8) 00:11:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:21 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x0, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:21 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x0, 0x80}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:21 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(r6, &(0x7f0000000380)={0x1, 0x4}, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000002400)={0xec, 0x0, &(0x7f0000002280)=[@release, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x50, 0x18, &(0x7f0000001000)=ANY=[@ANYBLOB="852a646600000400", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r4, @ANYBLOB="0000006f58000000000000008561646600000000060000000000000000000000000000002800000000000000"], &(0x7f0000001080)={0x0, 0x18, 0x30}}}, @decrefs={0x40046307, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f00000020c0)={@ptr={0x70742a85, 0x1, &(0x7f00000010c0)=""/4096, 0x1000, 0x3, 0xc}, @flat=@weak_binder={0x77622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0x100, 0x3}}, &(0x7f0000002140)={0x0, 0x28, 0x40}}}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000002180)=""/21, 0x15, 0x1, 0x13}, @fd={0x66642a85, 0x0, r5}}, &(0x7f0000002240)={0x0, 0x28, 0x50}}}], 0x6c, 0x0, &(0x7f0000002380)="51bd47f3e8b73d84b0b10aa4c918be3474b7af91620c3909e8bd33c9c81a2642db4f284e71da1566ef017916096988c955260bc176c33a7b998c039e54f78d896943890a3b524e09e4e172247223776546ea7f9b40dd07da0d80cd8195743ce8f9c6f82a0d3c3fbd6af199ed"}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) 00:11:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 681.383636][T19605] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 681.395138][T19605] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 681.399378][T19604] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 681.401539][T19604] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x0, 0x7, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x0, 0x7, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x0, 0x7, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x94e28be2d28442d9, 0x3, 0x0, 0x3}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:21 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(r6, &(0x7f0000000380)={0x1, 0x4}, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000002400)={0xec, 0x0, &(0x7f0000002280)=[@release, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x50, 0x18, &(0x7f0000001000)=ANY=[@ANYBLOB="852a646600000400", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r4, @ANYBLOB="0000006f58000000000000008561646600000000060000000000000000000000000000002800000000000000"], &(0x7f0000001080)={0x0, 0x18, 0x30}}}, @decrefs={0x40046307, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f00000020c0)={@ptr={0x70742a85, 0x1, &(0x7f00000010c0)=""/4096, 0x1000, 0x3, 0xc}, @flat=@weak_binder={0x77622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0x100, 0x3}}, &(0x7f0000002140)={0x0, 0x28, 0x40}}}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000002180)=""/21, 0x15, 0x1, 0x13}, @fd={0x66642a85, 0x0, r5}}, &(0x7f0000002240)={0x0, 0x28, 0x50}}}], 0x6c, 0x0, &(0x7f0000002380)="51bd47f3e8b73d84b0b10aa4c918be3474b7af91620c3909e8bd33c9c81a2642db4f284e71da1566ef017916096988c955260bc176c33a7b998c039e54f78d896943890a3b524e09e4e172247223776546ea7f9b40dd07da0d80cd8195743ce8f9c6f82a0d3c3fbd6af199ed"}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) 00:11:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:21 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:21 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(r6, &(0x7f0000000380)={0x1, 0x4}, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000002400)={0xec, 0x0, &(0x7f0000002280)=[@release, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x50, 0x18, &(0x7f0000001000)=ANY=[@ANYBLOB="852a646600000400", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r4, @ANYBLOB="0000006f58000000000000008561646600000000060000000000000000000000000000002800000000000000"], &(0x7f0000001080)={0x0, 0x18, 0x30}}}, @decrefs={0x40046307, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f00000020c0)={@ptr={0x70742a85, 0x1, &(0x7f00000010c0)=""/4096, 0x1000, 0x3, 0xc}, @flat=@weak_binder={0x77622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0x100, 0x3}}, &(0x7f0000002140)={0x0, 0x28, 0x40}}}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000002180)=""/21, 0x15, 0x1, 0x13}, @fd={0x66642a85, 0x0, r5}}, &(0x7f0000002240)={0x0, 0x28, 0x50}}}], 0x6c, 0x0, &(0x7f0000002380)="51bd47f3e8b73d84b0b10aa4c918be3474b7af91620c3909e8bd33c9c81a2642db4f284e71da1566ef017916096988c955260bc176c33a7b998c039e54f78d896943890a3b524e09e4e172247223776546ea7f9b40dd07da0d80cd8195743ce8f9c6f82a0d3c3fbd6af199ed"}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) 00:11:21 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 681.942115][T19628] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 681.955779][T19630] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 00:11:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 681.958899][T19630] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 681.961011][T19628] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:11:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:22 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(r6, &(0x7f0000000380)={0x1, 0x4}, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000002400)={0xec, 0x0, &(0x7f0000002280)=[@release, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x50, 0x18, &(0x7f0000001000)=ANY=[@ANYBLOB="852a646600000400", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r4, @ANYBLOB="0000006f58000000000000008561646600000000060000000000000000000000000000002800000000000000"], &(0x7f0000001080)={0x0, 0x18, 0x30}}}, @decrefs={0x40046307, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f00000020c0)={@ptr={0x70742a85, 0x1, &(0x7f00000010c0)=""/4096, 0x1000, 0x3, 0xc}, @flat=@weak_binder={0x77622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0x100, 0x3}}, &(0x7f0000002140)={0x0, 0x28, 0x40}}}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000040)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000002180)=""/21, 0x15, 0x1, 0x13}, @fd={0x66642a85, 0x0, r5}}, &(0x7f0000002240)={0x0, 0x28, 0x50}}}], 0x6c, 0x0, &(0x7f0000002380)="51bd47f3e8b73d84b0b10aa4c918be3474b7af91620c3909e8bd33c9c81a2642db4f284e71da1566ef017916096988c955260bc176c33a7b998c039e54f78d896943890a3b524e09e4e172247223776546ea7f9b40dd07da0d80cd8195743ce8f9c6f82a0d3c3fbd6af199ed"}) 00:11:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:22 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:22 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000, 0x0, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(r6, &(0x7f0000000380)={0x1, 0x4}, 0x2) 00:11:22 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x1, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 682.522090][T19650] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 682.526244][T19650] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 682.537896][T19653] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 682.539943][T19653] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x5, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:22 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x80000}) 00:11:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:23 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x0, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001280)={0x2, 0xe, 0x100, 0x21c}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:23 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) ioctl$sock_TIOCOUTQ(r5, 0x5411, 0x0) 00:11:23 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x0, 0xb, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) [ 683.075370][T19675] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 00:11:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 683.083770][T19675] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 683.085367][T19676] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 683.090378][T19676] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:11:23 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) 00:11:23 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 00:11:23 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r4, 0x5411, 0x0) 00:11:23 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) socket$can_bcm(0x1d, 0x2, 0x2) 00:11:23 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x0, 0x0, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:23 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x0, 0x0, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:23 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002440)) [ 683.630520][T19690] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 683.641345][T19690] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 683.651457][T19693] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 683.653518][T19693] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:23 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) 00:11:23 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) 00:11:23 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) 00:11:23 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) 00:11:23 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) fsmount(r0, 0x1, 0x1) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) 00:11:23 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) fsmount(r0, 0x1, 0x1) socket$can_bcm(0x1d, 0x2, 0x2) syz_init_net_socket$ax25(0x3, 0x5, 0x7) 00:11:24 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) fsmount(r0, 0x1, 0x1) syz_init_net_socket$ax25(0x3, 0x5, 0x7) 00:11:24 executing program 0: fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) 00:11:24 executing program 0: fsmount(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) 00:11:24 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:24 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:24 executing program 0: syz_init_net_socket$ax25(0x3, 0x5, 0x7) [ 684.194420][T19715] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 684.196477][T19715] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 684.204261][T19717] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 684.219931][T19717] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:24 executing program 0: syz_init_net_socket$ax25(0x3, 0x0, 0x7) 00:11:24 executing program 0: syz_init_net_socket$ax25(0x3, 0x0, 0x7) 00:11:24 executing program 0: syz_init_net_socket$ax25(0x3, 0x0, 0x7) 00:11:24 executing program 0: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 00:11:24 executing program 0: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 00:11:24 executing program 0: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 00:11:24 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 00:11:24 executing program 1: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) [ 684.744480][T19732] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 684.746475][T19732] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 684.769707][T19734] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 684.773168][T19734] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:24 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 00:11:24 executing program 3: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x1) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x81}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) 00:11:24 executing program 0: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:24 executing program 5: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x400}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1f}]}, 0x44}, 0x1, 0x0, 0x0, 0x4010}, 0x24000010) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x401}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x240080c0}, 0x480c4) 00:11:25 executing program 5: socketpair(0x1a, 0x8000c, 0x7ff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) setsockopt$MRT_DEL_MFC_PROXY(r1, 0x0, 0xd3, &(0x7f0000000040)={@rand_addr=0x64010101, @local, 0xffffffffffffffff, "92a1f805e57d80efbca18d7dbefb0a4dd70bdfde66ebb32d686b930fa7480988", 0x80000000, 0x1000, 0xa, 0x7ff}, 0x3c) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) 00:11:25 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 00:11:25 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 00:11:25 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70f4, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x1, 0xd, 0x7, 0x9, 0x50}, @map_val={0x18, 0x53ed2fb07f9cf7dd, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0x3, 0x7, 0x5, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0xfffff008, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x1, 0x3, 0x10001}, 0x10, 0x0, r2, 0x0, &(0x7f0000000180)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r6) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000480)={&(0x7f0000000440)=[0x0, 0x0], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[r5, r6, r1, r7, r8]}, 0x80) 00:11:25 executing program 5: socketpair(0x1a, 0x8000c, 0x7ff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) setsockopt$MRT_DEL_MFC_PROXY(r1, 0x0, 0xd3, &(0x7f0000000040)={@rand_addr=0x64010101, @local, 0xffffffffffffffff, "92a1f805e57d80efbca18d7dbefb0a4dd70bdfde66ebb32d686b930fa7480988", 0x80000000, 0x1000, 0xa, 0x7ff}, 0x3c) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) [ 685.126521][T19749] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 685.129940][T19749] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:25 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0x0) 00:11:25 executing program 1: syz_init_net_socket$ax25(0x3, 0x0, 0x0) 00:11:25 executing program 5: socketpair(0x1a, 0x8000c, 0x7ff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) setsockopt$MRT_DEL_MFC_PROXY(r1, 0x0, 0xd3, &(0x7f0000000040)={@rand_addr=0x64010101, @local, 0xffffffffffffffff, "92a1f805e57d80efbca18d7dbefb0a4dd70bdfde66ebb32d686b930fa7480988", 0x80000000, 0x1000, 0xa, 0x7ff}, 0x3c) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) 00:11:25 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0x0) [ 685.298277][ T6058] usb 1-1: new high-speed USB device number 75 using dummy_hcd 00:11:25 executing program 5: socketpair(0x1a, 0x8000c, 0x7ff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) setsockopt$MRT_DEL_MFC_PROXY(r1, 0x0, 0xd3, &(0x7f0000000040)={@rand_addr=0x64010101, @local, 0xffffffffffffffff, "92a1f805e57d80efbca18d7dbefb0a4dd70bdfde66ebb32d686b930fa7480988", 0x80000000, 0x1000, 0xa, 0x7ff}, 0x3c) [ 685.488610][ T6058] usb 1-1: device descriptor read/64, error 18 [ 685.766719][ T6058] usb 1-1: new high-speed USB device number 76 using dummy_hcd [ 685.966706][ T6058] usb 1-1: device descriptor read/64, error 18 [ 686.097371][ T6058] usb usb1-port1: attempt power cycle [ 686.506741][ T6058] usb 1-1: new high-speed USB device number 77 using dummy_hcd [ 686.606924][ T6058] usb 1-1: Invalid ep0 maxpacket: 0 [ 686.768516][ T6058] usb 1-1: new high-speed USB device number 78 using dummy_hcd [ 686.866965][ T6058] usb 1-1: Invalid ep0 maxpacket: 0 [ 686.868214][ T6058] usb usb1-port1: unable to enumerate USB device 00:11:28 executing program 0: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:28 executing program 4: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 00:11:28 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0x0) 00:11:28 executing program 5: socketpair(0x1a, 0x8000c, 0x7ff, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:11:28 executing program 1: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socketpair(0x22, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd2d, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x20000004) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x800, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x44}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x34}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x8040) 00:11:28 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70f4, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x1, 0xd, 0x7, 0x9, 0x50}, @map_val={0x18, 0x53ed2fb07f9cf7dd, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0x3, 0x7, 0x5, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0xfffff008, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x1, 0x3, 0x10001}, 0x10, 0x0, r2, 0x0, &(0x7f0000000180)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r6) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000480)={&(0x7f0000000440)=[0x0, 0x0], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[r5, r6, r1, r7, r8]}, 0x80) 00:11:28 executing program 1: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socketpair(0x22, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd2d, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x20000004) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x800, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x44}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x34}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x8040) 00:11:28 executing program 5: socketpair(0x1a, 0x8000c, 0x7ff, &(0x7f0000000000)) [ 688.081323][T19772] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 688.083120][T19774] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 688.083258][T19772] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 688.086973][T19774] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:28 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) fsopen(&(0x7f0000000000)='virtiofs\x00', 0x0) 00:11:28 executing program 5: socketpair(0x0, 0x8000c, 0x7ff, &(0x7f0000000000)) 00:11:28 executing program 1: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socketpair(0x22, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd2d, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x20000004) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x800, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x44}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x34}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x8040) 00:11:28 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) fsopen(&(0x7f0000000000)='virtiofs\x00', 0x0) [ 688.496724][T32371] usb 1-1: new high-speed USB device number 79 using dummy_hcd [ 688.686735][T32371] usb 1-1: device descriptor read/64, error 18 [ 688.956738][T32371] usb 1-1: new high-speed USB device number 80 using dummy_hcd [ 689.147221][T32371] usb 1-1: device descriptor read/64, error 18 [ 689.267609][T32371] usb usb1-port1: attempt power cycle [ 689.686731][T32371] usb 1-1: new high-speed USB device number 81 using dummy_hcd [ 689.776744][T32371] usb 1-1: Invalid ep0 maxpacket: 0 [ 689.926721][T32371] usb 1-1: new high-speed USB device number 82 using dummy_hcd [ 690.016968][T32371] usb 1-1: Invalid ep0 maxpacket: 0 [ 690.018228][T32371] usb usb1-port1: unable to enumerate USB device 00:11:31 executing program 0: syz_usb_connect$cdc_ncm(0x5, 0x6e, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x0, 0x7f, 0x7f, 0x10, 0x9}, 0x48, &(0x7f0000000180)={0x5, 0xf, 0x48, 0x4, [@ptm_cap={0x3}, @generic={0x2f, 0x10, 0x2, "6185888cef129f7019cf6f0e75493f60de27003047363686d819c0c9a9c1bb948ae65e15c04701f7a16547df"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x0, 0x20, 0x200}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x1, 0x7, 0x87}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x420}}, {0xa4, &(0x7f00000002c0)=@string={0xa4, 0x3, "358deb6c41a861ed15e9d3735fa024c5af0316acbfbc059da0a257cf9d21fdfcc1b1c8387da9ae7131a4cc0d6b8ad5bd03ba7841c562760f2e0b84b2967abc793b75693ad0690980ae869bec5236e1ce20c3bf4cff801d538095cc1fa7be074472b1fc2fe96cbae0a150f70bff01d45a94deea1698be33aa92e73f150d34486eb008df082de48b3a8db11c149d2226c207529a233bbf8b7472ab638df916ed5ef76a"}}, {0x3d, &(0x7f0000000380)=@string={0x3d, 0x3, "27bfcc1e5438e63665a15949fb97cc6f7a297d7a9f20f30d6d7d475d27037042f8ebc7f074d9ff316eb35dfd27cc9a4321b2bca4c4901735a3cb16"}}, {0x93, &(0x7f00000003c0)=@string={0x93, 0x3, "33a6eb29f7e49b3c9a6be29feb7b6bef17b3d13af16fcecdbeab9b7c8521c779655f189076c4b56e0141cae2bd4bd81bc55f0ad132cce987cd8890e17a1ac5b2fd3156e0e6ddff7af41b70988e537b31de8c8a78cbf59abe7383cf4e553f158d07da618c73053f86ac9f90aa0ef407797e14c09b08282e19f3e91950b712aa3ef862dc88579ba02c8ec879da974dae0889"}}]}) 00:11:31 executing program 1: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socketpair(0x22, 0x4, 0xffffffff, &(0x7f0000000000)) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r0, 0x0, 0x70bd2d, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x20000004) 00:11:31 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) fsopen(&(0x7f0000000000)='virtiofs\x00', 0x0) 00:11:31 executing program 5: socketpair(0x0, 0x0, 0x7ff, &(0x7f0000000000)) 00:11:31 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0xfffffffffffffd10) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:31 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70f4, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x1, 0xd, 0x7, 0x9, 0x50}, @map_val={0x18, 0x53ed2fb07f9cf7dd, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0x3, 0x7, 0x5, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0xfffff008, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x1, 0x3, 0x10001}, 0x10, 0x0, r2, 0x0, &(0x7f0000000180)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r6) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000480)={&(0x7f0000000440)=[0x0, 0x0], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[r5, r6, r1, r7, r8]}, 0x80) [ 691.093565][T19797] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 691.097334][T19797] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:31 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0xfffffffffffffd10) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:31 executing program 2: fsopen(&(0x7f0000000000)='virtiofs\x00', 0x0) 00:11:31 executing program 1: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socketpair(0x22, 0x4, 0xffffffff, &(0x7f0000000000)) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 00:11:31 executing program 5: socketpair(0x0, 0x0, 0x7ff, &(0x7f0000000000)) 00:11:31 executing program 2: fsopen(0x0, 0x0) 00:11:31 executing program 1: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socketpair(0x22, 0x4, 0xffffffff, &(0x7f0000000000)) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) [ 691.536742][T32763] usb 1-1: new high-speed USB device number 83 using dummy_hcd [ 691.737083][T32763] usb 1-1: device descriptor read/64, error 18 [ 692.016735][T32763] usb 1-1: new high-speed USB device number 84 using dummy_hcd [ 692.216718][T32763] usb 1-1: device descriptor read/64, error 18 [ 692.337513][T32763] usb usb1-port1: attempt power cycle [ 692.756721][T32763] usb 1-1: new high-speed USB device number 85 using dummy_hcd [ 692.846892][T32763] usb 1-1: Invalid ep0 maxpacket: 0 [ 692.996736][T32763] usb 1-1: new high-speed USB device number 86 using dummy_hcd [ 693.086785][T32763] usb 1-1: Invalid ep0 maxpacket: 0 [ 693.088796][T32763] usb usb1-port1: unable to enumerate USB device 00:11:34 executing program 2: fsopen(0x0, 0x0) 00:11:34 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0xfffffffffffffd10) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:34 executing program 1: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socketpair(0x22, 0x4, 0xffffffff, &(0x7f0000000000)) 00:11:34 executing program 5: socketpair(0x0, 0x0, 0x7ff, &(0x7f0000000000)) 00:11:34 executing program 0: fsopen(&(0x7f0000000000)='virtiofs\x00', 0x0) 00:11:34 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70f4, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x1, 0xd, 0x7, 0x9, 0x50}, @map_val={0x18, 0x53ed2fb07f9cf7dd, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0x3, 0x7, 0x5, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0xfffff008, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x1, 0x3, 0x10001}, 0x10, 0x0, r2, 0x0, &(0x7f0000000180)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r6) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[r5, r6, r1, r7, 0xffffffffffffffff]}, 0x80) [ 694.160794][T19823] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 00:11:34 executing program 1: socketpair(0x22, 0x4, 0xffffffff, &(0x7f0000000000)) 00:11:34 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0xfffffffffffffd10) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) [ 694.176457][T19823] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:34 executing program 2: fsopen(0x0, 0x0) 00:11:34 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0xfffffffffffffd10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:34 executing program 0: fsopen(&(0x7f0000000000)='virtiofs\x00', 0x0) 00:11:34 executing program 5: socketpair(0x0, 0x8000c, 0x0, &(0x7f0000000000)) 00:11:34 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3394a48fcae804921a7cc3736e05cf01a", @ANYRES16=r1, @ANYBLOB="00042dbd7000fbdbdf25120000000500290000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x40000000) 00:11:34 executing program 1: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)) 00:11:34 executing program 0: fsopen(&(0x7f0000000000)='virtiofs\x00', 0x0) 00:11:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:34 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70f4, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x1, 0xd, 0x7, 0x9, 0x50}, @map_val={0x18, 0x53ed2fb07f9cf7dd, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0x3, 0x7, 0x5, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0xfffff008, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x1, 0x3, 0x10001}, 0x10, 0x0, r2, 0x0, &(0x7f0000000180)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r6) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[r5, r6, r1, r7, 0xffffffffffffffff]}, 0x80) 00:11:34 executing program 0: fsopen(0x0, 0x0) 00:11:34 executing program 5: socketpair(0x0, 0x8000c, 0x0, 0x0) 00:11:34 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:34 executing program 1: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)) 00:11:34 executing program 0: fsopen(0x0, 0x0) [ 694.779993][T19860] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 00:11:34 executing program 5: socketpair(0x0, 0x8000c, 0x0, 0x0) [ 694.787675][T19860] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:34 executing program 1: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)) 00:11:35 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3394a48fcae804921a7cc3736e05cf01a", @ANYRES16=r1, @ANYBLOB="00042dbd7000fbdbdf25120000000500290000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x40000000) 00:11:35 executing program 0: fsopen(0x0, 0x0) 00:11:35 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:35 executing program 5: socketpair(0x0, 0x8000c, 0x0, 0x0) 00:11:35 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3394a48fcae804921a7cc3736e05cf01a", @ANYRES16=r1, @ANYBLOB="00042dbd7000fbdbdf25120000000500290000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x40000000) 00:11:35 executing program 1: socketpair(0x22, 0x0, 0xffffffff, &(0x7f0000000000)) 00:11:35 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:35 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70f4, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x1, 0xd, 0x7, 0x9, 0x50}, @map_val={0x18, 0x53ed2fb07f9cf7dd, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0x3, 0x7, 0x5, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0xfffff008, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x1, 0x3, 0x10001}, 0x10, 0x0, r2, 0x0, &(0x7f0000000180)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r6) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[r5, r6, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:35 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3394a48fcae804921a7cc3736e05cf01a", @ANYRES16=r1, @ANYBLOB="00042dbd7000fbdbdf25120000000500290000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x40000000) 00:11:35 executing program 1: socketpair(0x22, 0x0, 0x0, &(0x7f0000000000)) 00:11:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) [ 695.394109][T19885] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 695.399852][T19885] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:35 executing program 1: socketpair(0x22, 0x0, 0x0, &(0x7f0000000000)) 00:11:35 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3394a48fcae804921a7cc3736e05cf01a", @ANYRES16=r1, @ANYBLOB="00042dbd7000fbdbdf25120000000500290000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x40000000) 00:11:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:35 executing program 1: socketpair(0x22, 0x0, 0x0, &(0x7f0000000000)) 00:11:36 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70f4, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x1, 0xd, 0x7, 0x9, 0x50}, @map_val={0x18, 0x53ed2fb07f9cf7dd, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0x3, 0x7, 0x5, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0xfffff008, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x1, 0x3, 0x10001}, 0x10, 0x0, r2, 0x0, &(0x7f0000000180)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[r5, r6, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 696.055423][T19898] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 696.068612][T19898] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:36 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3394a48fcae804921a7cc3736e05cf01a", @ANYRES16=r1, @ANYBLOB="00042dbd7000fbdbdf25120000000500290000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x40000000) 00:11:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:36 executing program 1: socketpair(0x22, 0x0, 0xffffffff, 0x0) 00:11:36 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3394a48fcae804921a7cc3736e05cf01a", @ANYRES16=r1, @ANYBLOB="00042dbd7000fbdbdf25120000000500290000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x40000000) 00:11:36 executing program 1: socketpair(0x22, 0x0, 0xffffffff, 0x0) 00:11:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:36 executing program 1: socketpair(0x22, 0x0, 0xffffffff, 0x0) 00:11:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:36 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) 00:11:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:36 executing program 1: socketpair(0x22, 0x0, 0x0, &(0x7f0000000000)) 00:11:36 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70f4, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x1, 0xd, 0x7, 0x9, 0x50}, @map_val={0x18, 0x53ed2fb07f9cf7dd, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0x3, 0x7, 0x5, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0xfffff008, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x1, 0x3, 0x10001}, 0x10, 0x0, r2, 0x0, &(0x7f0000000180)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 696.943188][T19924] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 696.954587][T19924] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:37 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3394a48fcae804921a7cc3736e05cf01a", @ANYRES16=r1, @ANYBLOB="00042dbd7000fbdbdf25120000000500290000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x40000000) 00:11:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:37 executing program 1: socketpair(0x22, 0x0, 0x0, &(0x7f0000000000)) 00:11:37 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3394a48fcae804921a7cc3736e05cf01a", @ANYRES16=r1, @ANYBLOB="00042dbd7000fbdbdf25120000000500290000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x40000000) 00:11:37 executing program 1: socketpair(0x22, 0x0, 0x0, &(0x7f0000000000)) 00:11:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x9, &(0x7f0000000000)=@framed={{}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x8, &(0x7f0000000000)=@framed={{}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:37 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 00:11:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x6, &(0x7f0000000000)=@framed={{}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:37 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 00:11:37 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r1, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r2, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:37 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70f4, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x1, 0xd, 0x7, 0x9, 0x50}, @map_val={0x18, 0x53ed2fb07f9cf7dd, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0x3, 0x7, 0x5, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0xfffff008, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x1, 0x3, 0x10001}, 0x10, 0x0, r2, 0x0, &(0x7f0000000180)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[r5, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 697.842734][T19952] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 697.844785][T19952] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:37 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) 00:11:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x40, 0x0, 0x1, 0x6, 0x800}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:37 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 00:11:37 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) 00:11:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:37 executing program 1: socketpair(0x22, 0x0, 0x0, 0x0) 00:11:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:38 executing program 1: socketpair(0x22, 0x0, 0x0, 0x0) 00:11:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:38 executing program 1: socketpair(0x22, 0x0, 0x0, 0x0) 00:11:38 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r1, 0x1, 0x4) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x8, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:38 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r1, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r2, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:38 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) 00:11:38 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70f4, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x1, 0xd, 0x7, 0x9, 0x50}, @map_val={0x18, 0x53ed2fb07f9cf7dd, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0x3, 0x7, 0x5, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0xfffff008, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x1, 0x3, 0x10001}, 0x10, 0x0, r2, 0x0, &(0x7f0000000180)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0xee, &(0x7f00000000c0)=""/238, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:38 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r1, 0x1, 0x4) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:38 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r1, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r2, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) [ 698.872215][T19990] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 698.874182][T19990] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:38 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r1, 0x1, 0x4) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:38 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fsopen(&(0x7f0000000100)='afs\x00', 0x1) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r1, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x7, 0x3}, 0x10}, 0x80) 00:11:39 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r1, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:11:39 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70f4, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x1, 0xd, 0x7, 0x9, 0x50}, @map_val={0x18, 0x53ed2fb07f9cf7dd, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0x3, 0x7, 0x5, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0xfffff008, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x1, 0x3, 0x10001}, 0x10, 0x0, r2, 0x0, &(0x7f0000000180)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:39 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) 00:11:39 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r1, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) [ 699.754830][T20011] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 699.759948][T20011] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:39 executing program 4: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vlan1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', r0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:39 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r1, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:39 executing program 4: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vlan1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', r0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:39 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fsopen(&(0x7f0000000100)='afs\x00', 0x1) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:39 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r1, 0x1, 0x4) 00:11:39 executing program 4: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vlan1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', r0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:39 executing program 4: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:39 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fsopen(&(0x7f0000000100)='afs\x00', 0x1) 00:11:40 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70f4, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x1, 0xd, 0x7, 0x9, 0x50}, @map_val={0x18, 0x53ed2fb07f9cf7dd, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0x3, 0x7, 0x5, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0xfffff008, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0x1, 0x3, 0x10001}, 0x10, 0x0, r2, 0x0, &(0x7f0000000180)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 700.321640][T20039] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 700.323579][T20039] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:40 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:40 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:40 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r3, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r4, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd31, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x0) 00:11:40 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r1, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:40 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) fsopen(&(0x7f0000000100)='afs\x00', 0x1) 00:11:40 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:40 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:40 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) fsopen(&(0x7f0000000100)='afs\x00', 0x1) 00:11:40 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:40 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:40 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:40 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) ioctl$RFKILL_IOC_MAX_SIZE(r1, 0x2, &(0x7f0000000240)=0x7f) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:40 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) fsopen(&(0x7f0000000100)='afs\x00', 0x1) [ 700.856191][T20067] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 700.859816][T20067] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:41 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r1, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r2, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:41 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r1, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:41 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:41 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) fsopen(&(0x7f0000000100)='afs\x00', 0x1) 00:11:41 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000011c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 701.599738][T20079] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 701.601636][T20079] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:41 executing program 5: fsopen(&(0x7f0000000100)='afs\x00', 0x1) 00:11:41 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:41 executing program 5: fsopen(0x0, 0x1) 00:11:41 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:42 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r1, 0x1, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:42 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:42 executing program 5: fsopen(0x0, 0x1) 00:11:42 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:42 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:42 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fsopen(&(0x7f0000000100)='afs\x00', 0x1) fsmount(r1, 0x1, 0x4) [ 702.482344][T20102] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 00:11:42 executing program 0: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x87c0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) [ 702.507459][T20102] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:42 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fsopen(&(0x7f0000000100)='afs\x00', 0x1) 00:11:42 executing program 5: fsopen(0x0, 0x1) 00:11:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:42 executing program 5: fsopen(&(0x7f0000000100)='afs\x00', 0x0) 00:11:43 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:43 executing program 0: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x87c0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:43 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) fsopen(&(0x7f0000000100)='afs\x00', 0x1) 00:11:43 executing program 5: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r1, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x6, &(0x7f0000000000)=@framed={{}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:43 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:43 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) fsopen(&(0x7f0000000100)='afs\x00', 0x1) [ 703.383247][T20126] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 703.385140][T20126] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x5, &(0x7f0000000000)=@framed={{}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:43 executing program 0: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x87c0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:43 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) fsopen(&(0x7f0000000100)='afs\x00', 0x1) 00:11:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:43 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) 00:11:44 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:44 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) fsopen(&(0x7f0000000100)='afs\x00', 0x1) 00:11:44 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f0000000280)) 00:11:44 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:44 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xe0}}, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x9) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r4, 0x0, 0x70bd2d, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}}, 0x20000004) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r4, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1}]}, 0x1c}}, 0x0) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000780)={&(0x7f00000003c0), 0xc, &(0x7f0000000400)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x110}, 0x1, 0x0, 0x0, 0x4c000}, 0x4000) sendmsg$FOU_CMD_DEL(r6, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}, @FOU_ATTR_TYPE={0x5, 0x4, 0x3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @private0}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8140}, 0xc000) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r2, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4014) 00:11:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) [ 704.265208][T20149] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 00:11:44 executing program 1: fsopen(&(0x7f0000000100)='afs\x00', 0x1) [ 704.298353][T20149] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:44 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f0000000280)) 00:11:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x5, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:44 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r1, 0x0, {0x2, 0x1}, 0xfd}, 0x18, &(0x7f0000000280)={&(0x7f0000000240)="afeb837c5734f8821d8ee7ac411f42ed83af506cdc67d58aaea530df83a64ece8ffbd546", 0x24}}, 0x800) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x98, 0x8}, 0xc) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400a18}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1e000000a079a22acf26c54cbcc029d04def645864878c28b78c1acf709cc340a58c0f356a501cf1479e1e0ff29573b3483b7451f8bbda694ad4963778fec8a911f2aa3bc7ddbd187abe5ac1c497cd987458cfdbd7f4", @ANYRES16=0x0, @ANYBLOB="000128b4220cd5010069c0dc58310bbf03c9e8dbdf25100000000500380000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4011}, 0x2c000015) listen(r2, 0x7) 00:11:44 executing program 1: fsopen(0x0, 0x1) 00:11:45 executing program 2: socketpair(0x0, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x9a, &(0x7f0000000080)=""/154, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:45 executing program 1: fsopen(0x0, 0x1) 00:11:45 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r1, 0x0, {0x2, 0x1}, 0xfd}, 0x18, &(0x7f0000000280)={&(0x7f0000000240)="afeb837c5734f8821d8ee7ac411f42ed83af506cdc67d58aaea530df83a64ece8ffbd546", 0x24}}, 0x800) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x98, 0x8}, 0xc) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400a18}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1e000000a079a22acf26c54cbcc029d04def645864878c28b78c1acf709cc340a58c0f356a501cf1479e1e0ff29573b3483b7451f8bbda694ad4963778fec8a911f2aa3bc7ddbd187abe5ac1c497cd987458cfdbd7f4", @ANYRES16=0x0, @ANYBLOB="000128b4220cd5010069c0dc58310bbf03c9e8dbdf25100000000500380000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4011}, 0x2c000015) listen(r2, 0x7) 00:11:45 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f0000000280)) 00:11:45 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0xf0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, r1, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 705.152743][T20179] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 705.161827][T20179] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:45 executing program 1: fsopen(0x0, 0x1) 00:11:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:45 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r1, 0x0, {0x2, 0x1}, 0xfd}, 0x18, &(0x7f0000000280)={&(0x7f0000000240)="afeb837c5734f8821d8ee7ac411f42ed83af506cdc67d58aaea530df83a64ece8ffbd546", 0x24}}, 0x800) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x98, 0x8}, 0xc) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400a18}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1e000000a079a22acf26c54cbcc029d04def645864878c28b78c1acf709cc340a58c0f356a501cf1479e1e0ff29573b3483b7451f8bbda694ad4963778fec8a911f2aa3bc7ddbd187abe5ac1c497cd987458cfdbd7f4", @ANYRES16=0x0, @ANYBLOB="000128b4220cd5010069c0dc58310bbf03c9e8dbdf25100000000500380000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4011}, 0x2c000015) listen(r2, 0x7) 00:11:45 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)) 00:11:45 executing program 1: fsopen(&(0x7f0000000100)='afs\x00', 0x0) 00:11:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x17, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:45 executing program 2: socketpair(0x0, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:45 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)) 00:11:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:45 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r1, 0x0, {0x2, 0x1}, 0xfd}, 0x18, &(0x7f0000000280)={&(0x7f0000000240)="afeb837c5734f8821d8ee7ac411f42ed83af506cdc67d58aaea530df83a64ece8ffbd546", 0x24}}, 0x800) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x98, 0x8}, 0xc) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) listen(r2, 0x7) 00:11:45 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)) 00:11:45 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:45 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)) 00:11:45 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)) 00:11:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:45 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r1, 0x0, {0x2, 0x1}, 0xfd}, 0x18, &(0x7f0000000280)={&(0x7f0000000240)="afeb837c5734f8821d8ee7ac411f42ed83af506cdc67d58aaea530df83a64ece8ffbd546", 0x24}}, 0x800) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x98, 0x8}, 0xc) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) listen(r2, 0x7) 00:11:45 executing program 2: socketpair(0x0, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) [ 705.710871][T20219] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 705.712809][T20219] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:45 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)) 00:11:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0xffffffc0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:45 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r1, 0x0, {0x2, 0x1}, 0xfd}, 0x18, &(0x7f0000000280)={&(0x7f0000000240)="afeb837c5734f8821d8ee7ac411f42ed83af506cdc67d58aaea530df83a64ece8ffbd546", 0x24}}, 0x800) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x98, 0x8}, 0xc) listen(r2, 0x7) 00:11:45 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x2, 0x0, 0x0) 00:11:45 executing program 2: socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:45 executing program 1: socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)) 00:11:46 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) r0 = syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000ec0)={0x14, &(0x7f0000000d80)={0x0, 0x37, 0xd1, {0xd1, 0x22, "3604ceac599938a2272953ff84ce99bcb7cfdcfea27a4864d063db22fe57085ee5721678befa8ae155e15c84ed9ffde67fec4837c4fcfcd85d49801c787a0c6892d0fc4d6db7d6177f1775a6b36ef1db8a96f87665dccc9d868275e5268234e9c08c4c6375b035be3c9424a4698276af55938d98d8a1bd50b1802b92a14bd51dc80d23611deb5a5434a272bf4c6034157428f286c3377d2c9aae3f63f56e57cfd6ad38109ae66fb95741f9d1f0e426150ddcbd75a3e55e7d60c7a461b57e6d983f3587e5c0f0075c970270f1d2ee9f"}}, &(0x7f0000000e80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001140)={0x44, &(0x7f0000000f00)={0x20, 0x9, 0x77, "1a2176a4ae4dcb350501e0544f62a89a9fe22100841139c809f1013f8b1558c63dc1cda203fb6d468467cb312b2c285e27f6b667712cf817f499c4c6b9556c359e4cec2fdbfe89f17570b2c13790323e7c20f50550e9c1b35ac9740f336059ea0ee64c5d79599731bfb72ce4587edb837b1d5b81cc64f9"}, &(0x7f0000000f80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000fc0)={0x0, 0x8, 0x1, 0x5b}, &(0x7f0000001000)={0x20, 0x80, 0x1c, {0x4, 0x4, 0x1f, 0x200, 0x7ff, 0xfff8, 0x8000, 0x6, 0x80, 0x4, 0x0, 0x6}}, &(0x7f0000001040)={0x20, 0x85, 0x4}, &(0x7f0000001080)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000010c0)={0x20, 0x87, 0x2, 0x5}, &(0x7f0000001100)={0x20, 0x89, 0x2, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) 00:11:46 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r1, 0x0, {0x2, 0x1}, 0xfd}, 0x18, &(0x7f0000000280)={&(0x7f0000000240)="afeb837c5734f8821d8ee7ac411f42ed83af506cdc67d58aaea530df83a64ece8ffbd546", 0x24}}, 0x800) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r2, 0x7) 00:11:46 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x2, 0x0, 0x0) 00:11:46 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000280)) 00:11:46 executing program 2: socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:46 executing program 2: socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:11:46 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x2, 0x0, 0x0) 00:11:46 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r1, 0x0, {0x2, 0x1}, 0xfd}, 0x18, &(0x7f0000000280)={&(0x7f0000000240)="afeb837c5734f8821d8ee7ac411f42ed83af506cdc67d58aaea530df83a64ece8ffbd546", 0x24}}, 0x800) listen(0xffffffffffffffff, 0x7) [ 706.329330][T20246] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 706.334802][T20246] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:46 executing program 4: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000000)=0x74073813) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) write$midi(r0, &(0x7f0000000340)="bfe1731aedaeb4d35fdddfa358dedacd2894edafdb8aa0e83d14910c5734ffe1c7b692aad818add2b294ebf5aa863a406495537614309987d07e81c791ab580a334e710b16acdf5da1b4889a591dd3c1e04cf91daf691d15c766fe952348acb0a336a43afed9da46d244ad3a9f94728baebbac7f2af9bbbe5766c2104e8e9f83d6f7683e9a744b61aed424c9112e4bdb419ec17fdacbcb764448c3b11ad8c6697c6b30c98363b3656955e7740832cd59554644c4267d4e995d0f7b3abc677514b30154075f52aa31ef0d030ed6cde77336c8bd15ccd196ef57676dc10d0f28", 0xdf) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000040)="175068ad", &(0x7f0000000080)=""/81, &(0x7f0000000100)="a1bdc3c64695", &(0x7f0000000140)="8ce17309b5189a66e89d023e35fe2b3894b515084a6d944dadbfc4d2a00b920ce46653dd6445578b2073b4a029ce199e451fbfe550d0a2f0411b56caa6e2976211565a0558f56b42ad5f6d45d791210ca5baa9835de8f7bf1ffbcdec3afb5cc63f9adf33abe002a211795ac6e0ec03cb0d4175e56998f3e5efd3cf63ec6bf1fd15d1", 0xffffffff, r1, 0x4}, 0x38) 00:11:46 executing program 0: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x4, 0x4, 0x7f, 0x5b2, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x5, 0x7}, 0x48) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380), 0x204000, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x4080, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000180)=@raw=[@map_val={0x18, 0xe, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000001c0)='GPL\x00', 0x4, 0x76, &(0x7f0000000200)=""/118, 0x41000, 0x18, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0xf, 0x2, 0x7fff}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)=[r1, r2, r4, 0x1, r3, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:11:46 executing program 2: socketpair(0x1, 0x2, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:46 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000280)) 00:11:46 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) syz_usb_connect$cdc_ncm(0x0, 0xa6, &(0x7f0000000a00)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x94, 0x2, 0x1, 0x6, 0x40, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "3bae18e18e72"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0xed, 0x6, 0xfffd, 0x1f}, {0x6, 0x24, 0x1a, 0x1f, 0xd}, [@mdlm={0x15, 0x24, 0x12, 0x73f}, @dmm={0x7, 0x24, 0x14, 0x1ff, 0x7}, @obex={0x5, 0x24, 0x15, 0x6}, @acm={0x4, 0x24, 0x2, 0xf}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0xf8, 0x7f}]}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x4, 0x3, 0x20}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x51, 0x3, 0x3}}}}}}}]}}, &(0x7f0000000d40)={0xa, &(0x7f0000000880)={0xa, 0x6, 0x0, 0x20, 0x7, 0x5e, 0xff, 0xc8}, 0x1af, &(0x7f0000000ac0)={0x5, 0xf, 0x1af, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xa, 0x3, 0x40, 0x4}, @generic={0xe1, 0x10, 0x3, "f6ab4f9d1cb8dc3b8479ea96ee81af073c07543135360dd0748314c58bcd82ca4d852ce1a6f3e32a43c32fdea027e77dfc93b5b573c59b974fa5567728277bb9c259efe8c99747517cd9bb1d1234ae07263c6a0285960c240d2310b72fb683143fc26f6e53968e5ac03782d7b194b43cb1bbef6b8f48e6be941a9c87d2baf2abcb89c871f5a7b030a32f2968b2e4b58809fafd7258e0ce7cccf35e524118aafcd9fc65ee2ac9cf170e3fa21beb6a3e2d84ef79c325358980adafe9c1973bae01496966d79e0435ec595eb0609d5ca37e038827772b8ddd72820711d53342"}, @generic={0xa9, 0x10, 0xb, "897e184d52aee7a3b521ae620f46c7e3859980dbf0f0447a7af01384fd28c5792080c8794d44e3d80829229385aabbf41d77b1fcdf0eb445f0dcfe45b4d060285b38f52e3817655df1419c34378014a52234a6f2accd3dc3cab2d2683b282a6a9bff8c24922b19361a7d5372242fadf2d3f6695d672d571b7ec9eca76a77ab3b9ccfe92ddd7efd6620464f76fa6d4ffafabb300bfa345b6602a24f193994fda05382d2dcd65c"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x1, 0xff, 0x1ff, 0x3}, @wireless={0xb, 0x10, 0x1, 0x2, 0x83, 0x4e, 0x1, 0x3, 0x5}]}, 0x1, [{0x8b, &(0x7f0000000c80)=@string={0x8b, 0x3, "41cdabdfc68fda0b94e1b8f14936d26251d879d6592e9e6d0fd1a54271dd0fa6370da898d893603ce761d9a685b8b12710b232cb0ac11ae8be0191d33bfedfc699cad9cc4d86c1e50c09fc364f30249ead0a56989b18bce4ec5be0651374f57911c84ce9dd25401edc6b6edcbc1280ac5774afd837c2dad716bb10b30accb38ebe12f7531129a20f41"}}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:46 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fedbdf250300000014006202d02532090000000000000000000000ffffac14142006000a004e21000014000700fe880000000000000000000000000001050004"], 0x4c}, 0x1, 0x0, 0x0, 0x20048001}, 0x80c0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000180)={r0, 0x3}) r2 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000002c0)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r1, 0x522, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3648}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000002}, 0x4000) 00:11:46 executing program 4: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000000)=0x74073813) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) write$midi(r0, &(0x7f0000000340)="bfe1731aedaeb4d35fdddfa358dedacd2894edafdb8aa0e83d14910c5734ffe1c7b692aad818add2b294ebf5aa863a406495537614309987d07e81c791ab580a334e710b16acdf5da1b4889a591dd3c1e04cf91daf691d15c766fe952348acb0a336a43afed9da46d244ad3a9f94728baebbac7f2af9bbbe5766c2104e8e9f83d6f7683e9a744b61aed424c9112e4bdb419ec17fdacbcb764448c3b11ad8c6697c6b30c98363b3656955e7740832cd59554644c4267d4e995d0f7b3abc677514b30154075f52aa31ef0d030ed6cde77336c8bd15ccd196ef57676dc10d0f28", 0xdf) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000040)="175068ad", &(0x7f0000000080)=""/81, &(0x7f0000000100)="a1bdc3c64695", &(0x7f0000000140)="8ce17309b5189a66e89d023e35fe2b3894b515084a6d944dadbfc4d2a00b920ce46653dd6445578b2073b4a029ce199e451fbfe550d0a2f0411b56caa6e2976211565a0558f56b42ad5f6d45d791210ca5baa9835de8f7bf1ffbcdec3afb5cc63f9adf33abe002a211795ac6e0ec03cb0d4175e56998f3e5efd3cf63ec6bf1fd15d1", 0xffffffff, r1, 0x4}, 0x38) 00:11:46 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r1, 0x0, {0x2, 0x1}, 0xfd}, 0x18, &(0x7f0000000280)={&(0x7f0000000240)="afeb837c5734f8821d8ee7ac411f42ed83af506cdc67d58aaea530df83a64ece8ffbd546", 0x24}}, 0x800) listen(0xffffffffffffffff, 0x7) 00:11:46 executing program 2: socketpair(0x1, 0x2, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:46 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r1, 0x0, {0x2, 0x1}, 0xfd}, 0x18, &(0x7f0000000280)={&(0x7f0000000240)="afeb837c5734f8821d8ee7ac411f42ed83af506cdc67d58aaea530df83a64ece8ffbd546", 0x24}}, 0x800) listen(0xffffffffffffffff, 0x7) 00:11:46 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fedbdf250300000014006202d02532090000000000000000000000ffffac14142006000a004e21000014000700fe880000000000000000000000000001050004"], 0x4c}, 0x1, 0x0, 0x0, 0x20048001}, 0x80c0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000180)={r0, 0x3}) r2 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000002c0)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r1, 0x522, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3648}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000002}, 0x4000) [ 706.920299][T20272] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 00:11:46 executing program 4: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000000)=0x74073813) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) write$midi(r0, &(0x7f0000000340)="bfe1731aedaeb4d35fdddfa358dedacd2894edafdb8aa0e83d14910c5734ffe1c7b692aad818add2b294ebf5aa863a406495537614309987d07e81c791ab580a334e710b16acdf5da1b4889a591dd3c1e04cf91daf691d15c766fe952348acb0a336a43afed9da46d244ad3a9f94728baebbac7f2af9bbbe5766c2104e8e9f83d6f7683e9a744b61aed424c9112e4bdb419ec17fdacbcb764448c3b11ad8c6697c6b30c98363b3656955e7740832cd59554644c4267d4e995d0f7b3abc677514b30154075f52aa31ef0d030ed6cde77336c8bd15ccd196ef57676dc10d0f28", 0xdf) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000040)="175068ad", &(0x7f0000000080)=""/81, &(0x7f0000000100)="a1bdc3c64695", &(0x7f0000000140)="8ce17309b5189a66e89d023e35fe2b3894b515084a6d944dadbfc4d2a00b920ce46653dd6445578b2073b4a029ce199e451fbfe550d0a2f0411b56caa6e2976211565a0558f56b42ad5f6d45d791210ca5baa9835de8f7bf1ffbcdec3afb5cc63f9adf33abe002a211795ac6e0ec03cb0d4175e56998f3e5efd3cf63ec6bf1fd15d1", 0xffffffff, r1, 0x4}, 0x38) [ 706.934906][T20272] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:11:46 executing program 2: socketpair(0x1, 0x2, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:46 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'pimreg\x00'}) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r1, 0x7) 00:11:46 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000280)) 00:11:47 executing program 3: syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f00000006c0)={0x14, &(0x7f0000000580)={0x0, 0x11, 0xe6, {0xe6, 0x11, "7c48231198b5ad02216acc1dfb2969d783fd3a0fc5978b0e504a9312db9125af47bac724d103f29725396a8d5e0ac30911f2c944b102332071509968329440113c0e03a8b5ed5179171248cbd1b5600e76fef2ec6eb00629641b6fc04ea6d05e3c93e3c2f1aa6ff50283de965992dc7563c88fa4a34df52009864409412f6d66afab82eebbbf1d54864e3b92430332936fb8d347ebf88c6c91161ac0bbdecfddba6db1b0ef6d6bcc0fe471e0d43c85530a5866223c5ec29dd8ca473fa147aeaa38fcf636fb34de4f5c34ae0dbcb6de54487b86d6ec9bd57364ef68879b01e6d8a7b6457d"}}, &(0x7f0000000680)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x20, 0x1, 0xc, "8ecd07124a5d6e6debafca90"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x1f}, &(0x7f00000007c0)={0x20, 0x80, 0x1c, {0x2, 0xff, 0x18b9b64f, 0x8, 0x8, 0x8, 0x1, 0x10001, 0x1, 0x7fff, 0x4f6, 0xff}}, &(0x7f0000000800)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000840)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xfffb}, &(0x7f00000008c0)={0x20, 0x89, 0x2, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:47 executing program 4: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000000)=0x74073813) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) write$midi(r0, &(0x7f0000000340)="bfe1731aedaeb4d35fdddfa358dedacd2894edafdb8aa0e83d14910c5734ffe1c7b692aad818add2b294ebf5aa863a406495537614309987d07e81c791ab580a334e710b16acdf5da1b4889a591dd3c1e04cf91daf691d15c766fe952348acb0a336a43afed9da46d244ad3a9f94728baebbac7f2af9bbbe5766c2104e8e9f83d6f7683e9a744b61aed424c9112e4bdb419ec17fdacbcb764448c3b11ad8c6697c6b30c98363b3656955e7740832cd59554644c4267d4e995d0f7b3abc677514b30154075f52aa31ef0d030ed6cde77336c8bd15ccd196ef57676dc10d0f28", 0xdf) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:47 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fedbdf250300000014006202d02532090000000000000000000000ffffac14142006000a004e21000014000700fe880000000000000000000000000001050004"], 0x4c}, 0x1, 0x0, 0x0, 0x20048001}, 0x80c0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000180)={r0, 0x3}) r2 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000002c0)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r1, 0x522, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3648}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000002}, 0x4000) 00:11:47 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:47 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r1, 0x7) 00:11:47 executing program 1: socketpair(0x1, 0x0, 0x0, 0x0) 00:11:47 executing program 1: socketpair(0x1, 0x0, 0x0, 0x0) 00:11:47 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:47 executing program 4: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000000)=0x74073813) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) write$midi(r0, &(0x7f0000000340)="bfe1731aedaeb4d35fdddfa358dedacd2894edafdb8aa0e83d14910c5734ffe1c7b692aad818add2b294ebf5aa863a406495537614309987d07e81c791ab580a334e710b16acdf5da1b4889a591dd3c1e04cf91daf691d15c766fe952348acb0a336a43afed9da46d244ad3a9f94728baebbac7f2af9bbbe5766c2104e8e9f83d6f7683e9a744b61aed424c9112e4bdb419ec17fdacbcb764448c3b11ad8c6697c6b30c98363b3656955e7740832cd59554644c4267d4e995d0f7b3abc677514b30154075f52aa31ef0d030ed6cde77336c8bd15ccd196ef57676dc10d0f28", 0xdf) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:47 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fedbdf250300000014006202d02532090000000000000000000000ffffac14142006000a004e21000014000700fe880000000000000000000000000001050004"], 0x4c}, 0x1, 0x0, 0x0, 0x20048001}, 0x80c0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000180)={r0, 0x3}) r1 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000002c0)) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) 00:11:47 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x7) 00:11:47 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fedbdf250300000014006202d02532090000000000000000000000ffffac14142006000a004e21000014000700fe880000000000000000000000000001050004"], 0x4c}, 0x1, 0x0, 0x0, 0x20048001}, 0x80c0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000180)={r0, 0x3}) r1 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000002c0)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) 00:11:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:48 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:48 executing program 1: socketpair(0x1, 0x0, 0x0, 0x0) 00:11:48 executing program 5: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xfffffffffffffd3d) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x7) 00:11:48 executing program 4: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000000)=0x74073813) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:48 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fedbdf250300000014006202d02532090000000000000000000000ffffac14142006000a004e21000014000700fe880000000000000000000000000001050004"], 0x4c}, 0x1, 0x0, 0x0, 0x20048001}, 0x80c0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000180)={r0, 0x3}) r1 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000002c0)) 00:11:48 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x7) 00:11:48 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001200)={&(0x7f0000000000)="fee45bed17588c784c5b4eaf820b7f3f2b337c39fa50f15a51c3ea233f7df7e733bd354954dfd9abc3f41849ba01850499c46e6d088fd9b28512a49d71e815ddc03adf5471b07d2e1acdae5989f5685d4dc5c47b3d63f26378e6a84e5f137cc72bf2e05e5068043ae11fa45b8659180007a020360a97c1e0dc3fe08c70ab942909a148541a8395404499fd18338d", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="9930dded4b251f23abacba3386f4ecbe0a97e861db9cf166038539b8adb235af5cb65146cf4ad1f3f5eef5eeb08b44c1fe77ceac314646247e29cd5eee530349a16de2", &(0x7f0000001140)="bc098da6c3959b1a9d42f8b7404ae3270c1c2085495c802be5f6dff64b6aee7a4b2229b8d5653a7158b6b9581d03301927630230e21b35de07b3b98e2e9c1cabb3787eda8d8a31c63f60a530a4029335e1392fd48930ce0b8c8ea45d28903f6a4d8c7cf7cac7d3bc72da4329655c235150b1f42bb8d5e033f438ef0fa881b1f12f88217ac259a8d50013e3a9d845c5375762bfd4c49d1c2af11f3ca6d0310b10287e7d455925da110c61b6d5bde5d49a0082873e67e3a848a7", 0x7, 0x1}, 0x38) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001680)=@bpf_tracing={0x1a, 0xe, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0xac}, @cb_func={0x18, 0xa}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @map_fd, @map_fd={0x18, 0x7, 0x1, 0x0, r1}]}, &(0x7f0000001580)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0xd, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001600)={0x0, 0x0, 0x3, 0xc9e}, 0x10, 0xd95, 0xffffffffffffffff, 0x0, &(0x7f0000001640)=[r0, 0x1]}, 0x80) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r2, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:48 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fedbdf250300000014006202d02532090000000000000000000000ffffac14142006000a004e21000014000700fe880000000000000000000000000001050004"], 0x4c}, 0x1, 0x0, 0x0, 0x20048001}, 0x80c0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000180)={r0, 0x3}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) 00:11:48 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:48 executing program 4: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000000)=0x74073813) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:48 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:48 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(0xffffffffffffffff, 0x7) 00:11:48 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:48 executing program 4: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000000)=0x74073813) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:48 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001200)={&(0x7f0000000000)="fee45bed17588c784c5b4eaf820b7f3f2b337c39fa50f15a51c3ea233f7df7e733bd354954dfd9abc3f41849ba01850499c46e6d088fd9b28512a49d71e815ddc03adf5471b07d2e1acdae5989f5685d4dc5c47b3d63f26378e6a84e5f137cc72bf2e05e5068043ae11fa45b8659180007a020360a97c1e0dc3fe08c70ab942909a148541a8395404499fd18338d", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="9930dded4b251f23abacba3386f4ecbe0a97e861db9cf166038539b8adb235af5cb65146cf4ad1f3f5eef5eeb08b44c1fe77ceac314646247e29cd5eee530349a16de2", &(0x7f0000001140)="bc098da6c3959b1a9d42f8b7404ae3270c1c2085495c802be5f6dff64b6aee7a4b2229b8d5653a7158b6b9581d03301927630230e21b35de07b3b98e2e9c1cabb3787eda8d8a31c63f60a530a4029335e1392fd48930ce0b8c8ea45d28903f6a4d8c7cf7cac7d3bc72da4329655c235150b1f42bb8d5e033f438ef0fa881b1f12f88217ac259a8d50013e3a9d845c5375762bfd4c49d1c2af11f3ca6d0310b10287e7d455925da110c61b6d5bde5d49a0082873e67e3a848a7", 0x7, 0x1}, 0x38) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001680)=@bpf_tracing={0x1a, 0xe, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0xac}, @cb_func={0x18, 0xa}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @map_fd, @map_fd={0x18, 0x7, 0x1, 0x0, r1}]}, &(0x7f0000001580)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0xd, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001600)={0x0, 0x0, 0x3, 0xc9e}, 0x10, 0xd95, 0xffffffffffffffff, 0x0, &(0x7f0000001640)=[r0, 0x1]}, 0x80) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r2, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:48 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fedbdf250300000014006202d02532090000000000000000000000ffffac14142006000a004e21000014000700fe880000000000000000000000000001050004"], 0x4c}, 0x1, 0x0, 0x0, 0x20048001}, 0x80c0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000180)={r0, 0x3}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) 00:11:48 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:48 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:48 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(0xffffffffffffffff, 0x7) 00:11:48 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fedbdf250300000014006202d02532090000000000000000000000ffffac14142006000a004e21000014000700fe880000000000000000000000000001050004"], 0x4c}, 0x1, 0x0, 0x0, 0x20048001}, 0x80c0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000180)={r0, 0x3}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) 00:11:48 executing program 4: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:48 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:11:48 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001200)={&(0x7f0000000000)="fee45bed17588c784c5b4eaf820b7f3f2b337c39fa50f15a51c3ea233f7df7e733bd354954dfd9abc3f41849ba01850499c46e6d088fd9b28512a49d71e815ddc03adf5471b07d2e1acdae5989f5685d4dc5c47b3d63f26378e6a84e5f137cc72bf2e05e5068043ae11fa45b8659180007a020360a97c1e0dc3fe08c70ab942909a148541a8395404499fd18338d", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="9930dded4b251f23abacba3386f4ecbe0a97e861db9cf166038539b8adb235af5cb65146cf4ad1f3f5eef5eeb08b44c1fe77ceac314646247e29cd5eee530349a16de2", &(0x7f0000001140)="bc098da6c3959b1a9d42f8b7404ae3270c1c2085495c802be5f6dff64b6aee7a4b2229b8d5653a7158b6b9581d03301927630230e21b35de07b3b98e2e9c1cabb3787eda8d8a31c63f60a530a4029335e1392fd48930ce0b8c8ea45d28903f6a4d8c7cf7cac7d3bc72da4329655c235150b1f42bb8d5e033f438ef0fa881b1f12f88217ac259a8d50013e3a9d845c5375762bfd4c49d1c2af11f3ca6d0310b10287e7d455925da110c61b6d5bde5d49a0082873e67e3a848a7", 0x7, 0x1}, 0x38) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001680)=@bpf_tracing={0x1a, 0xe, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0xac}, @cb_func={0x18, 0xa}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @map_fd, @map_fd={0x18, 0x7, 0x1, 0x0, r1}]}, &(0x7f0000001580)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0xd, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001600)={0x0, 0x0, 0x3, 0xc9e}, 0x10, 0xd95, 0xffffffffffffffff, 0x0, &(0x7f0000001640)=[r0, 0x1]}, 0x80) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r2, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:48 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:48 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fedbdf250300000014006202d02532090000000000000000000000ffffac14142006000a004e21000014000700fe880000000000000000000000000001050004"], 0x4c}, 0x1, 0x0, 0x0, 0x20048001}, 0x80c0) r1 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000002c0)) 00:11:48 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(0xffffffffffffffff, 0x7) 00:11:48 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001200)={&(0x7f0000000000)="fee45bed17588c784c5b4eaf820b7f3f2b337c39fa50f15a51c3ea233f7df7e733bd354954dfd9abc3f41849ba01850499c46e6d088fd9b28512a49d71e815ddc03adf5471b07d2e1acdae5989f5685d4dc5c47b3d63f26378e6a84e5f137cc72bf2e05e5068043ae11fa45b8659180007a020360a97c1e0dc3fe08c70ab942909a148541a8395404499fd18338d", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="9930dded4b251f23abacba3386f4ecbe0a97e861db9cf166038539b8adb235af5cb65146cf4ad1f3f5eef5eeb08b44c1fe77ceac314646247e29cd5eee530349a16de2", &(0x7f0000001140)="bc098da6c3959b1a9d42f8b7404ae3270c1c2085495c802be5f6dff64b6aee7a4b2229b8d5653a7158b6b9581d03301927630230e21b35de07b3b98e2e9c1cabb3787eda8d8a31c63f60a530a4029335e1392fd48930ce0b8c8ea45d28903f6a4d8c7cf7cac7d3bc72da4329655c235150b1f42bb8d5e033f438ef0fa881b1f12f88217ac259a8d50013e3a9d845c5375762bfd4c49d1c2af11f3ca6d0310b10287e7d455925da110c61b6d5bde5d49a0082873e67e3a848a7", 0x7, 0x1}, 0x38) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001680)=@bpf_tracing={0x1a, 0xe, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0xac}, @cb_func={0x18, 0xa}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @map_fd, @map_fd={0x18, 0x7, 0x1, 0x0, r1}]}, &(0x7f0000001580)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0xd, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001600)={0x0, 0x0, 0x3, 0xc9e}, 0x10, 0xd95, 0xffffffffffffffff, 0x0, &(0x7f0000001640)=[r0, 0x1]}, 0x80) accept4$x25(0xffffffffffffffff, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:48 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000002c0)) 00:11:48 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) 00:11:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:48 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:11:48 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001200)={&(0x7f0000000000)="fee45bed17588c784c5b4eaf820b7f3f2b337c39fa50f15a51c3ea233f7df7e733bd354954dfd9abc3f41849ba01850499c46e6d088fd9b28512a49d71e815ddc03adf5471b07d2e1acdae5989f5685d4dc5c47b3d63f26378e6a84e5f137cc72bf2e05e5068043ae11fa45b8659180007a020360a97c1e0dc3fe08c70ab942909a148541a8395404499fd18338d", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="9930dded4b251f23abacba3386f4ecbe0a97e861db9cf166038539b8adb235af5cb65146cf4ad1f3f5eef5eeb08b44c1fe77ceac314646247e29cd5eee530349a16de2", &(0x7f0000001140)="bc098da6c3959b1a9d42f8b7404ae3270c1c2085495c802be5f6dff64b6aee7a4b2229b8d5653a7158b6b9581d03301927630230e21b35de07b3b98e2e9c1cabb3787eda8d8a31c63f60a530a4029335e1392fd48930ce0b8c8ea45d28903f6a4d8c7cf7cac7d3bc72da4329655c235150b1f42bb8d5e033f438ef0fa881b1f12f88217ac259a8d50013e3a9d845c5375762bfd4c49d1c2af11f3ca6d0310b10287e7d455925da110c61b6d5bde5d49a0082873e67e3a848a7", 0x7, 0x1}, 0x38) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001680)=@bpf_tracing={0x1a, 0xe, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0xac}, @cb_func={0x18, 0xa}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @map_fd, @map_fd={0x18, 0x7, 0x1, 0x0, r1}]}, &(0x7f0000001580)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0xd, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001600)={0x0, 0x0, 0x3, 0xc9e}, 0x10, 0xd95, 0xffffffffffffffff, 0x0, &(0x7f0000001640)=[r0, 0x1]}, 0x80) accept4$x25(0xffffffffffffffff, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:48 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)) 00:11:49 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:49 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:49 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:11:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x9, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:49 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001200)={&(0x7f0000000000)="fee45bed17588c784c5b4eaf820b7f3f2b337c39fa50f15a51c3ea233f7df7e733bd354954dfd9abc3f41849ba01850499c46e6d088fd9b28512a49d71e815ddc03adf5471b07d2e1acdae5989f5685d4dc5c47b3d63f26378e6a84e5f137cc72bf2e05e5068043ae11fa45b8659180007a020360a97c1e0dc3fe08c70ab942909a148541a8395404499fd18338d", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="9930dded4b251f23abacba3386f4ecbe0a97e861db9cf166038539b8adb235af5cb65146cf4ad1f3f5eef5eeb08b44c1fe77ceac314646247e29cd5eee530349a16de2", &(0x7f0000001140)="bc098da6c3959b1a9d42f8b7404ae3270c1c2085495c802be5f6dff64b6aee7a4b2229b8d5653a7158b6b9581d03301927630230e21b35de07b3b98e2e9c1cabb3787eda8d8a31c63f60a530a4029335e1392fd48930ce0b8c8ea45d28903f6a4d8c7cf7cac7d3bc72da4329655c235150b1f42bb8d5e033f438ef0fa881b1f12f88217ac259a8d50013e3a9d845c5375762bfd4c49d1c2af11f3ca6d0310b10287e7d455925da110c61b6d5bde5d49a0082873e67e3a848a7", 0x7, 0x1}, 0x38) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001680)=@bpf_tracing={0x1a, 0xe, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0xac}, @cb_func={0x18, 0xa}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @map_fd, @map_fd={0x18, 0x7, 0x1, 0x0, r1}]}, &(0x7f0000001580)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0xd, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001600)={0x0, 0x0, 0x3, 0xc9e}, 0x10, 0xd95, 0xffffffffffffffff, 0x0, &(0x7f0000001640)=[r0, 0x1]}, 0x80) accept4$x25(0xffffffffffffffff, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:49 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)) 00:11:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:49 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:11:49 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)) 00:11:49 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:49 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001200)={&(0x7f0000000000)="fee45bed17588c784c5b4eaf820b7f3f2b337c39fa50f15a51c3ea233f7df7e733bd354954dfd9abc3f41849ba01850499c46e6d088fd9b28512a49d71e815ddc03adf5471b07d2e1acdae5989f5685d4dc5c47b3d63f26378e6a84e5f137cc72bf2e05e5068043ae11fa45b8659180007a020360a97c1e0dc3fe08c70ab942909a148541a8395404499fd18338d", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="9930dded4b251f23abacba3386f4ecbe0a97e861db9cf166038539b8adb235af5cb65146cf4ad1f3f5eef5eeb08b44c1fe77ceac314646247e29cd5eee530349a16de2", &(0x7f0000001140)="bc098da6c3959b1a9d42f8b7404ae3270c1c2085495c802be5f6dff64b6aee7a4b2229b8d5653a7158b6b9581d03301927630230e21b35de07b3b98e2e9c1cabb3787eda8d8a31c63f60a530a4029335e1392fd48930ce0b8c8ea45d28903f6a4d8c7cf7cac7d3bc72da4329655c235150b1f42bb8d5e033f438ef0fa881b1f12f88217ac259a8d50013e3a9d845c5375762bfd4c49d1c2af11f3ca6d0310b10287e7d455925da110c61b6d5bde5d49a0082873e67e3a848a7", 0x7, 0x1}, 0x38) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r2, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:50 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:50 executing program 0: socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) 00:11:50 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001200)={&(0x7f0000000000)="fee45bed17588c784c5b4eaf820b7f3f2b337c39fa50f15a51c3ea233f7df7e733bd354954dfd9abc3f41849ba01850499c46e6d088fd9b28512a49d71e815ddc03adf5471b07d2e1acdae5989f5685d4dc5c47b3d63f26378e6a84e5f137cc72bf2e05e5068043ae11fa45b8659180007a020360a97c1e0dc3fe08c70ab942909a148541a8395404499fd18338d", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="9930dded4b251f23abacba3386f4ecbe0a97e861db9cf166038539b8adb235af5cb65146cf4ad1f3f5eef5eeb08b44c1fe77ceac314646247e29cd5eee530349a16de2", &(0x7f0000001140)="bc098da6c3959b1a9d42f8b7404ae3270c1c2085495c802be5f6dff64b6aee7a4b2229b8d5653a7158b6b9581d03301927630230e21b35de07b3b98e2e9c1cabb3787eda8d8a31c63f60a530a4029335e1392fd48930ce0b8c8ea45d28903f6a4d8c7cf7cac7d3bc72da4329655c235150b1f42bb8d5e033f438ef0fa881b1f12f88217ac259a8d50013e3a9d845c5375762bfd4c49d1c2af11f3ca6d0310b10287e7d455925da110c61b6d5bde5d49a0082873e67e3a848a7", 0x7, 0x1}, 0x38) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r1, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:50 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x8, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:50 executing program 5: recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x40002100) 00:11:50 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001200)={&(0x7f0000000000)="fee45bed17588c784c5b4eaf820b7f3f2b337c39fa50f15a51c3ea233f7df7e733bd354954dfd9abc3f41849ba01850499c46e6d088fd9b28512a49d71e815ddc03adf5471b07d2e1acdae5989f5685d4dc5c47b3d63f26378e6a84e5f137cc72bf2e05e5068043ae11fa45b8659180007a020360a97c1e0dc3fe08c70ab942909a148541a8395404499fd18338d", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="9930dded4b251f23abacba3386f4ecbe0a97e861db9cf166038539b8adb235af5cb65146cf4ad1f3f5eef5eeb08b44c1fe77ceac314646247e29cd5eee530349a16de2", &(0x7f0000001140)="bc098da6c3959b1a9d42f8b7404ae3270c1c2085495c802be5f6dff64b6aee7a4b2229b8d5653a7158b6b9581d03301927630230e21b35de07b3b98e2e9c1cabb3787eda8d8a31c63f60a530a4029335e1392fd48930ce0b8c8ea45d28903f6a4d8c7cf7cac7d3bc72da4329655c235150b1f42bb8d5e033f438ef0fa881b1f12f88217ac259a8d50013e3a9d845c5375762bfd4c49d1c2af11f3ca6d0310b10287e7d455925da110c61b6d5bde5d49a0082873e67e3a848a7", 0x7, 0x1}, 0x38) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r1, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:50 executing program 0: socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) 00:11:50 executing program 5: recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x40002100) 00:11:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0xfffffe00, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:50 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:50 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001200)={&(0x7f0000000000)="fee45bed17588c784c5b4eaf820b7f3f2b337c39fa50f15a51c3ea233f7df7e733bd354954dfd9abc3f41849ba01850499c46e6d088fd9b28512a49d71e815ddc03adf5471b07d2e1acdae5989f5685d4dc5c47b3d63f26378e6a84e5f137cc72bf2e05e5068043ae11fa45b8659180007a020360a97c1e0dc3fe08c70ab942909a148541a8395404499fd18338d", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="9930dded4b251f23abacba3386f4ecbe0a97e861db9cf166038539b8adb235af5cb65146cf4ad1f3f5eef5eeb08b44c1fe77ceac314646247e29cd5eee530349a16de2", &(0x7f0000001140)="bc098da6c3959b1a9d42f8b7404ae3270c1c2085495c802be5f6dff64b6aee7a4b2229b8d5653a7158b6b9581d03301927630230e21b35de07b3b98e2e9c1cabb3787eda8d8a31c63f60a530a4029335e1392fd48930ce0b8c8ea45d28903f6a4d8c7cf7cac7d3bc72da4329655c235150b1f42bb8d5e033f438ef0fa881b1f12f88217ac259a8d50013e3a9d845c5375762bfd4c49d1c2af11f3ca6d0310b10287e7d455925da110c61b6d5bde5d49a0082873e67e3a848a7", 0x7, 0x1}, 0x38) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r0, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x6, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @alu={0x7, 0x1, 0xa, 0x6, 0x6, 0x4, 0xfffffffffffffffc}], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:50 executing program 0: socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) 00:11:50 executing program 5: recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x40002100) 00:11:51 executing program 5: socketpair(0x0, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x0, 0x6, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:51 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 00:11:51 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001200)={&(0x7f0000000000)="fee45bed17588c784c5b4eaf820b7f3f2b337c39fa50f15a51c3ea233f7df7e733bd354954dfd9abc3f41849ba01850499c46e6d088fd9b28512a49d71e815ddc03adf5471b07d2e1acdae5989f5685d4dc5c47b3d63f26378e6a84e5f137cc72bf2e05e5068043ae11fa45b8659180007a020360a97c1e0dc3fe08c70ab942909a148541a8395404499fd18338d", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="9930dded4b251f23abacba3386f4ecbe0a97e861db9cf166038539b8adb235af5cb65146cf4ad1f3f5eef5eeb08b44c1fe77ceac314646247e29cd5eee530349a16de2", &(0x7f0000001140)="bc098da6c3959b1a9d42f8b7404ae3270c1c2085495c802be5f6dff64b6aee7a4b2229b8d5653a7158b6b9581d03301927630230e21b35de07b3b98e2e9c1cabb3787eda8d8a31c63f60a530a4029335e1392fd48930ce0b8c8ea45d28903f6a4d8c7cf7cac7d3bc72da4329655c235150b1f42bb8d5e033f438ef0fa881b1f12f88217ac259a8d50013e3a9d845c5375762bfd4c49d1c2af11f3ca6d0310b10287e7d455925da110c61b6d5bde5d49a0082873e67e3a848a7", 0x7, 0x1}, 0x38) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r0, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x0, 0x0, 0xff, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:51 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r0, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:51 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 00:11:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:51 executing program 5: socketpair(0x0, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:51 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0}, 0x40002100) 00:11:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:51 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 00:11:51 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r0, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:51 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x0, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:52 executing program 5: socketpair(0x0, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:52 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0}, 0x0) 00:11:52 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r0, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x0, &(0x7f0000000280), &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x0, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:52 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x0, &(0x7f0000000280), &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x0, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:52 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$x25(r0, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:52 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:52 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x0, &(0x7f0000000280), &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x0, 0x0, 0xff, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 00:11:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu={0x0, 0x1, 0x0, 0x7, 0x6, 0x20, 0x1}], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:53 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:53 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$x25(r0, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x0, 0x0, 0xff, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 00:11:53 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000001240)="c79c0ed3a124d87470049232a9a53f91b2c3896d5d3398285d269a75bdc1735fcd7474227f79c4502fd37c880044c12a13d79a44ad58400e97d0e523ffab3dcf159881237d0366c93c391d94155066a0f647c702971f65e64b", &(0x7f00000012c0)=""/148, &(0x7f0000001380)="5eaa4523155d02e3f6eb987698218f068eb8a3b36dba9d82a43cc0682b6212937c3e090521b95596ef930437d6288e16f19a846de87749de5f17ef860f473e8e7c03249232d5cbc4a4072409a634024cef5424ed98a1bab7ba3b210c917c87f5ddffa0b293a1baee8c250ffa63d5032909af5a96dfb7bcf85a517346fe155293262459e280024af3ea487e15f08f8843f87838726b9d1b271e879d190c7abb3bfb7ab0c5ab87", &(0x7f0000001440)="6a96c9eefdee8c7d0216fb214f694fcb54cf54fb37e3875f350e49e3865e3b3949933132369d9eb2405ae420b6a882669883eeff1d41885b282b0b276a5751e4d3db6a1501edf662ee38442eddb18a5ab5fa43b47c772b02925c4a4d3c50cc", 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001200)={&(0x7f0000000000)="fee45bed17588c784c5b4eaf820b7f3f2b337c39fa50f15a51c3ea233f7df7e733bd354954dfd9abc3f41849ba01850499c46e6d088fd9b28512a49d71e815ddc03adf5471b07d2e1acdae5989f5685d4dc5c47b3d63f26378e6a84e5f137cc72bf2e05e5068043ae11fa45b8659180007a020360a97c1e0dc3fe08c70ab942909a148541a8395404499fd18338d", &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)="9930dded4b251f23abacba3386f4ecbe0a97e861db9cf166038539b8adb235af5cb65146cf4ad1f3f5eef5eeb08b44c1fe77ceac314646247e29cd5eee530349a16de2", &(0x7f0000001140)="bc098da6c3959b1a9d42f8b7404ae3270c1c2085495c802be5f6dff64b6aee7a4b2229b8d5653a7158b6b9581d03301927630230e21b35de07b3b98e2e9c1cabb3787eda8d8a31c63f60a530a4029335e1392fd48930ce0b8c8ea45d28903f6a4d8c7cf7cac7d3bc72da4329655c235150b1f42bb8d5e033f438ef0fa881b1f12f88217ac259a8d50013e3a9d845c5375762bfd4c49d1c2af11f3ca6d0310b10287e7d455925da110c61b6d5bde5d49a0082873e67e3a848a7", 0x7, 0x1}, 0x38) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001680)=@bpf_tracing={0x1a, 0xe, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0xac}, @cb_func={0x18, 0xa}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @map_fd, @map_fd={0x18, 0x7, 0x1, 0x0, r1}]}, &(0x7f0000001580)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0xd, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001600)={0x0, 0x0, 0x3, 0xc9e}, 0x10, 0xd95, 0xffffffffffffffff, 0x0, &(0x7f0000001640)=[r0, 0x1]}, 0x80) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r2, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu={0x0, 0x0, 0x0, 0x7, 0x6, 0x20, 0x1}], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:53 executing program 5: socketpair(0x1, 0x2, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x40002100) 00:11:53 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$x25(r0, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:53 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x0, 0x0, 0xff, 0x1}, 0x48) 00:11:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu={0x0, 0x0, 0x0, 0x0, 0x6, 0x20, 0x1}], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:53 executing program 5: socketpair(0x1, 0x2, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x40002100) 00:11:53 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffe87) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', r0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r1, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:53 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000400)={0x5, &(0x7f0000000000)=[{@none}, {@none}, {@fixed}, {@none}, {@fixed}]}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={&(0x7f0000000540)="8eff9ec83cbe80211cef363583a3878a1082e4ab6507fb04e2c50d5031e5a3f08196884709bbbfc97843b7c7105f0b37c742ac8d4a1d024dfaa22c27b1ed7aec6c7b81c2eb86abe6b0857ff314819f555efc2f28db2d7bfb46b8b5994476b289200962b0cf5d70da8f8ccd230115527aba6d535902dfbc72354a61709315a6fa00000000", &(0x7f0000000440)=""/210, &(0x7f0000000200)="4ecc012b094963d4febec4d1d685254dc388914323460ceac9a5b61939f61e9e51f6b4444c05d5639848f3a9864790a58acb9202168376c687ef7054e1ca9026837bc3b581009c9d6949fe48770505764761c4cfd114146cd4704f7dd70ab93a62499ccaba6d7f356c768c1fab2aac1e94f75cbfbe37db403c517666a79254794b2dbcb428abb2e15f5ae19178f1be19d383", &(0x7f00000002c0)="53582209b0a5d8f9bcc386a0bc10f8c2f02dc38a927ff5f4d3fb3f5687c8121f4a0237b9d068d71baccea898556eb296d0186bace02ba51dbf1d9f254134ddfbbb2ec1ff8a938e9e1708fe7eb636002734a3db8404dae8dc25ffd6e85dc092c38aa30d7603d20dcaf58d39a686634b3387392f1f15e67e288eb0191d3279f14d42ea2b5657939049d599ea280360ab63dac9f25e11899ad0e2f96bd907b86f4252f0b624ace05632b7dd2e32d9c53682", 0x2, 0xffffffffffffffff, 0x4}, 0x38) r4 = fsmount(r1, 0x0, 0x8e) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r4, 0x3) 00:11:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1}], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:53 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:53 executing program 5: socketpair(0x1, 0x2, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x40002100) 00:11:53 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffe87) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', r0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r1, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:53 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:53 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x40002100) 00:11:54 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffe87) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', r0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r1, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:54 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000400)={0x5, &(0x7f0000000000)=[{@none}, {@none}, {@fixed}, {@none}, {@fixed}]}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={&(0x7f0000000540)="8eff9ec83cbe80211cef363583a3878a1082e4ab6507fb04e2c50d5031e5a3f08196884709bbbfc97843b7c7105f0b37c742ac8d4a1d024dfaa22c27b1ed7aec6c7b81c2eb86abe6b0857ff314819f555efc2f28db2d7bfb46b8b5994476b289200962b0cf5d70da8f8ccd230115527aba6d535902dfbc72354a61709315a6fa00000000", &(0x7f0000000440)=""/210, &(0x7f0000000200)="4ecc012b094963d4febec4d1d685254dc388914323460ceac9a5b61939f61e9e51f6b4444c05d5639848f3a9864790a58acb9202168376c687ef7054e1ca9026837bc3b581009c9d6949fe48770505764761c4cfd114146cd4704f7dd70ab93a62499ccaba6d7f356c768c1fab2aac1e94f75cbfbe37db403c517666a79254794b2dbcb428abb2e15f5ae19178f1be19d383", &(0x7f00000002c0)="53582209b0a5d8f9bcc386a0bc10f8c2f02dc38a927ff5f4d3fb3f5687c8121f4a0237b9d068d71baccea898556eb296d0186bace02ba51dbf1d9f254134ddfbbb2ec1ff8a938e9e1708fe7eb636002734a3db8404dae8dc25ffd6e85dc092c38aa30d7603d20dcaf58d39a686634b3387392f1f15e67e288eb0191d3279f14d42ea2b5657939049d599ea280360ab63dac9f25e11899ad0e2f96bd907b86f4252f0b624ace05632b7dd2e32d9c53682", 0x2, 0xffffffffffffffff, 0x4}, 0x38) r4 = fsmount(r1, 0x0, 0x8e) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r4, 0x3) 00:11:54 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x40002100) 00:11:54 executing program 0: recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:54 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000001740)={0x9, @remote}, &(0x7f0000001780)=0x12, 0x800) 00:11:54 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000400)={0x5, &(0x7f0000000000)=[{@none}, {@none}, {@fixed}, {@none}, {@fixed}]}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={&(0x7f0000000540)="8eff9ec83cbe80211cef363583a3878a1082e4ab6507fb04e2c50d5031e5a3f08196884709bbbfc97843b7c7105f0b37c742ac8d4a1d024dfaa22c27b1ed7aec6c7b81c2eb86abe6b0857ff314819f555efc2f28db2d7bfb46b8b5994476b289200962b0cf5d70da8f8ccd230115527aba6d535902dfbc72354a61709315a6fa00000000", &(0x7f0000000440)=""/210, &(0x7f0000000200)="4ecc012b094963d4febec4d1d685254dc388914323460ceac9a5b61939f61e9e51f6b4444c05d5639848f3a9864790a58acb9202168376c687ef7054e1ca9026837bc3b581009c9d6949fe48770505764761c4cfd114146cd4704f7dd70ab93a62499ccaba6d7f356c768c1fab2aac1e94f75cbfbe37db403c517666a79254794b2dbcb428abb2e15f5ae19178f1be19d383", &(0x7f00000002c0)="53582209b0a5d8f9bcc386a0bc10f8c2f02dc38a927ff5f4d3fb3f5687c8121f4a0237b9d068d71baccea898556eb296d0186bace02ba51dbf1d9f254134ddfbbb2ec1ff8a938e9e1708fe7eb636002734a3db8404dae8dc25ffd6e85dc092c38aa30d7603d20dcaf58d39a686634b3387392f1f15e67e288eb0191d3279f14d42ea2b5657939049d599ea280360ab63dac9f25e11899ad0e2f96bd907b86f4252f0b624ace05632b7dd2e32d9c53682", 0x2, 0xffffffffffffffff, 0x4}, 0x38) r4 = fsmount(r1, 0x0, 0x8e) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r4, 0x3) 00:11:54 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r0, 0x0, &(0x7f0000001780), 0x800) 00:11:54 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffe87) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', r0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, 0xffffffffffffffff, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:54 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x40002100) 00:11:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu], &(0x7f0000000300)='GPL\x00', 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:54 executing program 0: recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:54 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r0, 0x0, 0x0, 0x800) 00:11:54 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffe87) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', r0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, 0xffffffffffffffff, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:54 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x0) 00:11:54 executing program 0: recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu], 0x0, 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:54 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) accept4$x25(r0, 0x0, 0x0, 0x0) 00:11:54 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000400)={0x5, &(0x7f0000000000)=[{@none}, {@none}, {@fixed}, {@none}, {@fixed}]}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={&(0x7f0000000540)="8eff9ec83cbe80211cef363583a3878a1082e4ab6507fb04e2c50d5031e5a3f08196884709bbbfc97843b7c7105f0b37c742ac8d4a1d024dfaa22c27b1ed7aec6c7b81c2eb86abe6b0857ff314819f555efc2f28db2d7bfb46b8b5994476b289200962b0cf5d70da8f8ccd230115527aba6d535902dfbc72354a61709315a6fa00000000", &(0x7f0000000440)=""/210, &(0x7f0000000200)="4ecc012b094963d4febec4d1d685254dc388914323460ceac9a5b61939f61e9e51f6b4444c05d5639848f3a9864790a58acb9202168376c687ef7054e1ca9026837bc3b581009c9d6949fe48770505764761c4cfd114146cd4704f7dd70ab93a62499ccaba6d7f356c768c1fab2aac1e94f75cbfbe37db403c517666a79254794b2dbcb428abb2e15f5ae19178f1be19d383", &(0x7f00000002c0)="53582209b0a5d8f9bcc386a0bc10f8c2f02dc38a927ff5f4d3fb3f5687c8121f4a0237b9d068d71baccea898556eb296d0186bace02ba51dbf1d9f254134ddfbbb2ec1ff8a938e9e1708fe7eb636002734a3db8404dae8dc25ffd6e85dc092c38aa30d7603d20dcaf58d39a686634b3387392f1f15e67e288eb0191d3279f14d42ea2b5657939049d599ea280360ab63dac9f25e11899ad0e2f96bd907b86f4252f0b624ace05632b7dd2e32d9c53682", 0x2, 0xffffffffffffffff, 0x4}, 0x38) fsmount(r1, 0x0, 0x8e) 00:11:54 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000001b40)={'wpan1\x00'}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[], 0x2c}}, 0x20000004) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r1, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, 0x0, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x1d, r5, 0x1, {0x1, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000480)={&(0x7f0000000440)="d9ea0859e1", 0x5}}, 0x4040000) 00:11:54 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:54 executing program 1: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200), 0x48000, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r6) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_ext={0x1c, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x4}, @alu={0x7, 0x0, 0x4, 0xa, 0xa, 0x20, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xd0, &(0x7f0000000080)=""/208, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x0, 0xffffffff, 0x8}, 0x10, 0x8b7d, 0xffffffffffffffff, 0x0, &(0x7f0000000240)=[0x1, r0, r1, r2, r3, r4, r5, r6]}, 0x80) 00:11:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu], 0x0, 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:54 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000400)={0x5, &(0x7f0000000000)=[{@none}, {@none}, {@fixed}, {@none}, {@fixed}]}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={&(0x7f0000000540)="8eff9ec83cbe80211cef363583a3878a1082e4ab6507fb04e2c50d5031e5a3f08196884709bbbfc97843b7c7105f0b37c742ac8d4a1d024dfaa22c27b1ed7aec6c7b81c2eb86abe6b0857ff314819f555efc2f28db2d7bfb46b8b5994476b289200962b0cf5d70da8f8ccd230115527aba6d535902dfbc72354a61709315a6fa00000000", &(0x7f0000000440)=""/210, &(0x7f0000000200)="4ecc012b094963d4febec4d1d685254dc388914323460ceac9a5b61939f61e9e51f6b4444c05d5639848f3a9864790a58acb9202168376c687ef7054e1ca9026837bc3b581009c9d6949fe48770505764761c4cfd114146cd4704f7dd70ab93a62499ccaba6d7f356c768c1fab2aac1e94f75cbfbe37db403c517666a79254794b2dbcb428abb2e15f5ae19178f1be19d383", &(0x7f00000002c0)="53582209b0a5d8f9bcc386a0bc10f8c2f02dc38a927ff5f4d3fb3f5687c8121f4a0237b9d068d71baccea898556eb296d0186bace02ba51dbf1d9f254134ddfbbb2ec1ff8a938e9e1708fe7eb636002734a3db8404dae8dc25ffd6e85dc092c38aa30d7603d20dcaf58d39a686634b3387392f1f15e67e288eb0191d3279f14d42ea2b5657939049d599ea280360ab63dac9f25e11899ad0e2f96bd907b86f4252f0b624ace05632b7dd2e32d9c53682", 0x2, 0xffffffffffffffff, 0x4}, 0x38) 00:11:54 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffe87) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', r0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, 0xffffffffffffffff, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu], 0x0, 0xff, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:54 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:54 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffe87) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:54 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000001b40)={'wpan1\x00'}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[], 0x2c}}, 0x20000004) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r1, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, 0x0, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x1d, r5, 0x1, {0x1, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000480)={&(0x7f0000000440)="d9ea0859e1", 0x5}}, 0x4040000) 00:11:54 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x9}}, 0xe0}}, 0x0) 00:11:54 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000400)={0x5, &(0x7f0000000000)=[{@none}, {@none}, {@fixed}, {@none}, {@fixed}]}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) 00:11:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu], &(0x7f0000000300)='GPL\x00', 0x0, 0x59, &(0x7f0000000340)=""/89, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:55 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:55 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x9}}, 0xe0}}, 0x0) 00:11:55 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000400)={0x5, &(0x7f0000000000)=[{@none}, {@none}, {@fixed}, {@none}, {@fixed}]}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) socket$can_j1939(0x1d, 0x2, 0x7) 00:11:55 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:55 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000001b40)={'wpan1\x00'}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[], 0x2c}}, 0x20000004) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r1, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, 0x0, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'pimreg\x00', 0x0}) sendmsg$can_j1939(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x1d, r5, 0x1, {0x1, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000480)={&(0x7f0000000440)="d9ea0859e1", 0x5}}, 0x4040000) 00:11:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:55 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x9}}, 0xe0}}, 0x0) 00:11:55 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:55 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:55 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000400)={0x5, &(0x7f0000000000)=[{@none}, {@none}, {@fixed}, {@none}, {@fixed}]}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) 00:11:55 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000001b40)={'wpan1\x00'}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[], 0x2c}}, 0x20000004) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r1, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'pimreg\x00'}) 00:11:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:55 executing program 1: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x9}}, 0xe0}}, 0x0) 00:11:55 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:55 executing program 0: socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:55 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000400)={0x5, &(0x7f0000000000)=[{@none}, {@none}, {@fixed}, {@none}, {@fixed}]}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) 00:11:55 executing program 1: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x9}}, 0xe0}}, 0x0) 00:11:55 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000001b40)={'wpan1\x00'}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[], 0x2c}}, 0x20000004) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r1, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}) 00:11:55 executing program 0: socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:55 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:55 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000400)={0x5, &(0x7f0000000000)=[{@none}, {@none}, {@fixed}, {@none}, {@fixed}]}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) 00:11:55 executing program 0: socketpair(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:55 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 00:11:55 executing program 1: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x9}}, 0xe0}}, 0x0) 00:11:55 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000001b40)={'wpan1\x00'}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[], 0x2c}}, 0x20000004) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r1, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 00:11:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x1000, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:55 executing program 0: socketpair(0x1, 0x2, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:55 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000400)={0x5, &(0x7f0000000000)=[{@none}, {@none}, {@fixed}, {@none}, {@fixed}]}) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) 00:11:55 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 00:11:55 executing program 1: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x9}}, 0xe0}}, 0x0) 00:11:55 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000001b40)={'wpan1\x00'}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[], 0x2c}}, 0x20000004) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) 00:11:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:55 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) 00:11:55 executing program 0: socketpair(0x1, 0x2, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:55 executing program 1: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x9}}, 0xe0}}, 0x0) 00:11:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000280)=@raw=[@alu], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:11:55 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 00:11:55 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000001b40)={'wpan1\x00'}) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) 00:11:55 executing program 0: socketpair(0x1, 0x2, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:55 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) 00:11:55 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:55 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000001b40)={'wpan1\x00'}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[], 0x2c}}, 0x20000004) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r1, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'pimreg\x00'}) 00:11:55 executing program 1: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x9}}, 0xe0}}, 0x0) 00:11:55 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) 00:11:55 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:55 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) 00:11:55 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:11:55 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:55 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) 00:11:55 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:55 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) 00:11:55 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:11:55 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:55 executing program 4: syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) 00:11:55 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/201, 0xc9}], 0x6, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:55 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:11:55 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:55 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) 00:11:55 executing program 4: syz_open_dev$admmidi(0x0, 0x3, 0x240) 00:11:55 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) 00:11:55 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:11:55 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:55 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) 00:11:55 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:55 executing program 4: syz_open_dev$admmidi(0x0, 0x3, 0x240) 00:11:56 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:56 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) 00:11:56 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:56 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:11:56 executing program 4: syz_open_dev$admmidi(0x0, 0x3, 0x240) 00:11:56 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) 00:11:56 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, 0x0, 0x40002100) 00:11:56 executing program 3: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) 00:11:56 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:11:56 executing program 4: syz_open_dev$admmidi(&(0x7f00000003c0), 0x0, 0x240) 00:11:56 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:56 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) 00:11:56 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:11:56 executing program 3: syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) 00:11:56 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=""/112, 0x70}, 0x40002100) 00:11:56 executing program 4: syz_open_dev$admmidi(&(0x7f00000003c0), 0x0, 0x0) 00:11:56 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:56 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) 00:11:56 executing program 3: syz_open_dev$admmidi(0x0, 0x3, 0x240) 00:11:56 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:11:56 executing program 4: syz_open_dev$admmidi(&(0x7f00000003c0), 0x0, 0x0) 00:11:56 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:56 executing program 3: syz_open_dev$admmidi(0x0, 0x3, 0x240) 00:11:56 executing program 5: waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) 00:11:56 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:56 executing program 4: syz_open_dev$admmidi(&(0x7f00000003c0), 0x0, 0x0) 00:11:57 executing program 3: syz_open_dev$admmidi(0x0, 0x3, 0x240) 00:11:57 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:11:57 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x40002100) 00:11:57 executing program 5: waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) 00:11:57 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:57 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu={0x0, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:57 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) 00:11:57 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu={0x0, 0x0, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:57 executing program 3: syz_open_dev$admmidi(&(0x7f00000003c0), 0x0, 0x240) 00:11:57 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x9}}, 0xe0}}, 0x0) 00:11:57 executing program 5: waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) 00:11:57 executing program 3: syz_open_dev$admmidi(&(0x7f00000003c0), 0x0, 0x0) 00:11:57 executing program 4: waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) 00:11:57 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) 00:11:57 executing program 5: waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) 00:11:57 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x9}}, 0xe0}}, 0x0) 00:11:57 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu={0x0, 0x0, 0x0, 0x6, 0x6, 0x1, 0xfffffffffffffff0}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:57 executing program 3: syz_open_dev$admmidi(&(0x7f00000003c0), 0x0, 0x0) 00:11:57 executing program 4: waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) 00:11:57 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x9}}, 0xe0}}, 0x0) 00:11:57 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu={0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0xfffffffffffffff0}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:58 executing program 5: waitid(0x0, 0x0, 0x0, 0x8, 0x0) 00:11:58 executing program 4: waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) 00:11:58 executing program 3: syz_open_dev$admmidi(&(0x7f00000003c0), 0x0, 0x0) 00:11:58 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00E`', @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf250b00000008002b00ff03000008000b0001fcffff05002f0000000000050033000200000008002c0000000c000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)) 00:11:58 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff0}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:58 executing program 4: waitid(0x0, 0x0, 0x0, 0x0, 0x0) 00:11:58 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:11:58 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x6, 0x6, 0x1, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:58 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080), 0x208081, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000400)={0x5, &(0x7f0000000000)=[{@none}, {@none}, {@fixed}, {@none}, {@fixed}]}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0), 0x3, 0x240) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) socket$can_j1939(0x1d, 0x2, 0x7) 00:11:58 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) setsockopt$MRT_TABLE(r1, 0x0, 0xcf, &(0x7f0000000040)=0xffffffff, 0x4) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:58 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x3}}, 0xe0}}, 0x0) 00:11:58 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x2}}, 0xe0}}, 0x0) 00:11:58 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:58 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x2, 0x4, 0x220, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0xf}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x401, 0x5, 0x2, 0x1000, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x2, 0x9}, 0x48) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000600)={&(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x80400, 0x0, 0xffffffffffffffff}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, r3, r4, r0, r0, r5, r6, r7]}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000000)="88101e866c", &(0x7f0000000040)=""/61, &(0x7f0000000080)="53390087c5468d42d21bf1a758aa198dd6f09c7e320862d2f223cb2a62c9f7883780177a7d67da5ca1c2a5bc29a055c4a7e34bcb2dd2fa0a8bc5e60d039d9cbd39569584109bcdff83983eac0eb566b84db119d729d0afd4fb78b031360ca19da4e7029ff24e19831e622af90211cb31e1fcac957a64009cceb3a5971805ab074ea89762ee5be8c659134f1c7049033d7c56f8c373c96cda406f1bfa9500f2b3a259f9d142311e28626ecab5ad53aefbbde616463f9947547b73642fa318aaf6635b8d68c7479af2ab97e6d1af1ea871cca7b19e229a8dab618bbba63764353d09", &(0x7f0000000180)="7fbdbff00b45f3a8f59a00fe98d91c0d3db49447aa68e12755adcc17550c04cd3c519f326e361c57df347a3c3319945e3c8baff83f1c651b9a069d86751593b4ba1b7ca95b0bd7f023402d66741979d244667abeb56de49497bbab926b27b64b1d76e6a115ad042abf1f75bf495d19f8d7668ddb97d5cd5b486f755fa00f8d703cd09fe32d9dbf63f4fec1640bbd55eeed65eaaedd175e92358f52894b99046f9213adf2503a1cbcc7a3a8d2bae8769e9f704dca9cb4b1fe13546a45f027e20f018d86be00e972867363c4535445cb6f835b0610beda45d27bd090", 0x80000001, r0, 0x4}, 0x38) 00:11:58 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:11:58 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) setsockopt$MRT_TABLE(r1, 0x0, 0xcf, &(0x7f0000000040)=0xffffffff, 0x4) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:59 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x3}}, 0xe0}}, 0x0) 00:11:59 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x2}}, 0xe0}}, 0x0) 00:11:59 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:11:59 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x2, 0x4, 0x220, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0xf}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x401, 0x5, 0x2, 0x1000, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x2, 0x9}, 0x48) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000600)={&(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x80400, 0x0, 0xffffffffffffffff}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, r3, r4, r0, r0, r5, r6, r7]}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000000)="88101e866c", &(0x7f0000000040)=""/61, &(0x7f0000000080)="53390087c5468d42d21bf1a758aa198dd6f09c7e320862d2f223cb2a62c9f7883780177a7d67da5ca1c2a5bc29a055c4a7e34bcb2dd2fa0a8bc5e60d039d9cbd39569584109bcdff83983eac0eb566b84db119d729d0afd4fb78b031360ca19da4e7029ff24e19831e622af90211cb31e1fcac957a64009cceb3a5971805ab074ea89762ee5be8c659134f1c7049033d7c56f8c373c96cda406f1bfa9500f2b3a259f9d142311e28626ecab5ad53aefbbde616463f9947547b73642fa318aaf6635b8d68c7479af2ab97e6d1af1ea871cca7b19e229a8dab618bbba63764353d09", &(0x7f0000000180)="7fbdbff00b45f3a8f59a00fe98d91c0d3db49447aa68e12755adcc17550c04cd3c519f326e361c57df347a3c3319945e3c8baff83f1c651b9a069d86751593b4ba1b7ca95b0bd7f023402d66741979d244667abeb56de49497bbab926b27b64b1d76e6a115ad042abf1f75bf495d19f8d7668ddb97d5cd5b486f755fa00f8d703cd09fe32d9dbf63f4fec1640bbd55eeed65eaaedd175e92358f52894b99046f9213adf2503a1cbcc7a3a8d2bae8769e9f704dca9cb4b1fe13546a45f027e20f018d86be00e972867363c4535445cb6f835b0610beda45d27bd090", 0x80000001, r0, 0x4}, 0x38) 00:11:59 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x3}}, 0xe0}}, 0x0) 00:11:59 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) setsockopt$MRT_TABLE(r1, 0x0, 0xcf, &(0x7f0000000040)=0xffffffff, 0x4) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:59 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x6) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) 00:11:59 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x2}}, 0xe0}}, 0x0) 00:11:59 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 4: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x3}}, 0xe0}}, 0x0) 00:11:59 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x6) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) 00:11:59 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:59 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x2, 0x4, 0x220, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0xf}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x401, 0x5, 0x2, 0x1000, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x2, 0x9}, 0x48) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000600)={&(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x80400, 0x0, 0xffffffffffffffff}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, r3, r4, r0, r0, r5, r6, r7]}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000000)="88101e866c", &(0x7f0000000040)=""/61, &(0x7f0000000080)="53390087c5468d42d21bf1a758aa198dd6f09c7e320862d2f223cb2a62c9f7883780177a7d67da5ca1c2a5bc29a055c4a7e34bcb2dd2fa0a8bc5e60d039d9cbd39569584109bcdff83983eac0eb566b84db119d729d0afd4fb78b031360ca19da4e7029ff24e19831e622af90211cb31e1fcac957a64009cceb3a5971805ab074ea89762ee5be8c659134f1c7049033d7c56f8c373c96cda406f1bfa9500f2b3a259f9d142311e28626ecab5ad53aefbbde616463f9947547b73642fa318aaf6635b8d68c7479af2ab97e6d1af1ea871cca7b19e229a8dab618bbba63764353d09", &(0x7f0000000180)="7fbdbff00b45f3a8f59a00fe98d91c0d3db49447aa68e12755adcc17550c04cd3c519f326e361c57df347a3c3319945e3c8baff83f1c651b9a069d86751593b4ba1b7ca95b0bd7f023402d66741979d244667abeb56de49497bbab926b27b64b1d76e6a115ad042abf1f75bf495d19f8d7668ddb97d5cd5b486f755fa00f8d703cd09fe32d9dbf63f4fec1640bbd55eeed65eaaedd175e92358f52894b99046f9213adf2503a1cbcc7a3a8d2bae8769e9f704dca9cb4b1fe13546a45f027e20f018d86be00e972867363c4535445cb6f835b0610beda45d27bd090", 0x80000001, r0, 0x4}, 0x38) 00:11:59 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x2}}, 0xe0}}, 0x0) 00:11:59 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 4: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x3}}, 0xe0}}, 0x0) 00:11:59 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x6) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) 00:11:59 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:59 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x2}}, 0xe0}}, 0x0) 00:11:59 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x2, 0x4, 0x220, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0xf}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x401, 0x5, 0x2, 0x1000, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x2, 0x9}, 0x48) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000600)={&(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x80400, 0x0, 0xffffffffffffffff}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, r3, r4, r0, r0, r5, r6, r7]}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) 00:11:59 executing program 4: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x3}}, 0xe0}}, 0x0) 00:11:59 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x6) 00:11:59 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:59 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x2}}, 0xe0}}, 0x0) 00:11:59 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x2, 0x4, 0x220, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0xf}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x401, 0x5, 0x2, 0x1000, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x2, 0x9}, 0x48) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000600)={&(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x80400, 0x0, 0xffffffffffffffff}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, r3, r4, r0, r0, r5, r6, r7]}, 0x80) 00:11:59 executing program 4: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x3}}, 0xe0}}, 0x0) 00:11:59 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)=0x6) 00:11:59 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:59 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x2}}, 0xe0}}, 0x0) 00:11:59 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x2, 0x4, 0x220, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0xf}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x401, 0x5, 0x2, 0x1000, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x2, 0x9}, 0x48) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000600)={&(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x80400, 0x0, 0xffffffffffffffff}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, r3, r4, r0, r0, r5, r6, r7]}, 0x80) 00:11:59 executing program 4: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x3}}, 0xe0}}, 0x0) 00:11:59 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)=0x6) 00:11:59 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:59 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x2}}, 0xe0}}, 0x0) 00:11:59 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 4: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x3}}, 0xe0}}, 0x0) 00:11:59 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)=0x6) 00:11:59 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x2, 0x4, 0x220, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0xf}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x401, 0x5, 0x2, 0x1000, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x2, 0x9}, 0x48) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000600)={&(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x80400, 0x0, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, r3, r4, r0, r0, r5, r6, 0xffffffffffffffff]}, 0x80) 00:11:59 executing program 0: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:59 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x2}}, 0xe0}}, 0x0) 00:11:59 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:11:59 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x6) 00:11:59 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:59 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x2, 0x4, 0x220, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0xf}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x401, 0x5, 0x2, 0x1000, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x2, 0x9}, 0x48) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, r3, r4, r0, r0, r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:59 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x200, 0x5}, 0x10, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:11:59 executing program 0: socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:59 executing program 1: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x20040, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x6) 00:11:59 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x2, 0x4, 0x220, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0xf}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x401, 0x5, 0x2, 0x1000, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x2, 0x9}, 0x48) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, r3, r4, r0, r0, r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:59 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:11:59 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2aa21, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:11:59 executing program 0: socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:59 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x2, 0x4, 0x220, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0xf}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x401, 0x5, 0x2, 0x1000, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x2, 0x9}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, r3, r4, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:59 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:11:59 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 1: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x20040, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x6) 00:11:59 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:11:59 executing program 0: socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) 00:11:59 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:11:59 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x2, 0x4, 0x220, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0xf}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, r3, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:11:59 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 1: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x20040, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x6) 00:11:59 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:11:59 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(r0, 0x0, 0xcf, 0x0, 0x0) 00:11:59 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:11:59 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:11:59 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x6) 00:11:59 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:00 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:00 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(r0, 0x0, 0xcf, 0x0, 0x0) 00:12:00 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)=0x6) 00:12:00 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000180)=[0xffffffffffffffff]}, 0x80) 00:12:00 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:00 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(r0, 0x0, 0xcf, 0x0, 0x0) 00:12:00 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:00 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)=0x6) 00:12:00 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 00:12:00 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4) 00:12:00 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:00 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:00 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)=0x6) 00:12:00 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(r0, 0x0, 0xcf, 0x0, 0x0) 00:12:00 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:00 executing program 0: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x7f81, 0x20, 0x0, 0x0, {{0x17, 0x4, 0x2, 0x1, 0x5c, 0x64, 0x0, 0x81, 0x29, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x10}, {[@timestamp_prespec={0x44, 0x14, 0x68, 0x3, 0x8, [{@private=0xa010101, 0x4}, {@empty, 0x8}]}, @noop, @ra={0x94, 0x4}, @end, @timestamp_prespec={0x44, 0x24, 0xc, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}, {@empty, 0x400}]}, @lsrr={0x83, 0x7, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x2, 0x4, 0x220, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0xf}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x401, 0x5, 0x2, 0x1000, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x2, 0x9}, 0x48) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000600)={&(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x80400, 0x0, 0xffffffffffffffff}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, r2, r3, r4, r0, r0, r5, r6, r7]}, 0x80) 00:12:00 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, r0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:00 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 00:12:00 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(r0, 0x0, 0xcf, 0x0, 0x0) 00:12:00 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:00 executing program 0: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x85) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a9e}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x4, 0x5, 0x40, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, r2]}, 0x80) 00:12:00 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x3}}, 0xe0}}, 0x0) 00:12:00 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 00:12:00 executing program 3: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(r0, 0x0, 0xcf, 0x0, 0x0) 00:12:00 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x2}}, 0xe0}}, 0x0) 00:12:00 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x3}}, 0xe0}}, 0x0) 00:12:00 executing program 0: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x85) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a9e}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x4, 0x5, 0x40, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, r2]}, 0x80) 00:12:00 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 00:12:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x7, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 2: setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, 0x0, 0x0) 00:12:00 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x2}}, 0xe0}}, 0x0) 00:12:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 00:12:00 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x3}}, 0xe0}}, 0x0) 00:12:00 executing program 0: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x85) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a9e}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x4, 0x5, 0x40, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, r2]}, 0x80) 00:12:00 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)) 00:12:00 executing program 2: setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, 0x0, 0x0) 00:12:00 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}, '\x00', '\x00', 0x0, 0x2}}, 0xe0}}, 0x0) 00:12:00 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 00:12:00 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 00:12:00 executing program 2: setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, 0x0, 0x0) 00:12:00 executing program 0: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x85) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a9e}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x4, 0x5, 0x40, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, r2]}, 0x80) 00:12:00 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 00:12:00 executing program 2: socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, 0x0, 0x0) 00:12:00 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:00 executing program 0: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x85) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a9e}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x4, 0x5, 0x40, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 00:12:00 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 2: socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, 0x0, 0x0) 00:12:00 executing program 0: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a9e}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x4, 0x5, 0x40, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 00:12:00 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:00 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 0: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a9e}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x4, 0x5, 0x40, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 2: socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, 0x0, 0x0) 00:12:00 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0xffff) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) 00:12:00 executing program 1: ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 00:12:00 executing program 5: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socket$igmp(0x2, 0x3, 0x2) r0 = socket(0x1, 0x3, 0xffffff3f) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) 00:12:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 1: ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 00:12:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a9e}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x4, 0x5, 0x40, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 2: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, r0, 0x0, &(0x7f0000000200)=[r1]}, 0x80) 00:12:00 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0xffff) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) 00:12:00 executing program 5: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socket$igmp(0x2, 0x3, 0x2) r0 = socket(0x1, 0x3, 0xffffff3f) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) 00:12:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x5, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}, @call={0x85, 0x0, 0x0, 0xa7}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:00 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:00 executing program 1: ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 00:12:00 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0xffff) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) 00:12:00 executing program 2: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, r0, 0x0, &(0x7f0000000200)=[r1]}, 0x80) 00:12:01 executing program 5: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socket$igmp(0x2, 0x3, 0x2) r0 = socket(0x1, 0x3, 0xffffff3f) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x4, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @call={0x85, 0x0, 0x0, 0x7c}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 1: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 00:12:01 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:01 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) socket(0x2c, 0x1, 0xffff) 00:12:01 executing program 2: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, r0, 0x0, &(0x7f0000000200)=[r1]}, 0x80) 00:12:01 executing program 5: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socket$igmp(0x2, 0x3, 0x2) r0 = socket(0x1, 0x3, 0xffffff3f) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) 00:12:01 executing program 1: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x3, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @exit], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) socket(0x2c, 0x1, 0xffff) 00:12:01 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 1: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 00:12:01 executing program 5: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socket$igmp(0x2, 0x3, 0x2) socket(0x1, 0x3, 0xffffff3f) 00:12:01 executing program 2: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, r0, 0x0, &(0x7f0000000200)=[r1]}, 0x80) 00:12:01 executing program 4: socket(0x2c, 0x1, 0xffff) 00:12:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a9e}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x4, 0x5, 0x40, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 5: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socket(0x1, 0x3, 0xffffff3f) 00:12:01 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x0, &(0x7f00000002c0), &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 2: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, r0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:01 executing program 4: socket(0x0, 0x1, 0xffff) 00:12:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a9e}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x4, 0x5, 0x40, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 5: socket(0x1, 0x3, 0xffffff3f) 00:12:01 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x0, &(0x7f00000002c0), &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 2: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, r0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a9e}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x4, 0x5, 0x40, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 5: socket(0x0, 0x3, 0xffffff3f) 00:12:01 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x0, &(0x7f00000002c0), &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 4: socket(0x0, 0x1, 0xffff) 00:12:01 executing program 2: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) socket(0x2c, 0x1, 0xffff) 00:12:01 executing program 5: socket(0x0, 0x3, 0xffffff3f) 00:12:01 executing program 4: socket(0x0, 0x1, 0xffff) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x97) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], 0x0, 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xb, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0xa, 0x4, 0x5, 0x40, 0xfffffffffffffff0}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 4: socket(0x2c, 0x0, 0xffff) 00:12:01 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x97) 00:12:01 executing program 5: socket(0x0, 0x3, 0xffffff3f) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], 0x0, 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 4: socket(0x2c, 0x0, 0x0) 00:12:01 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 1: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x97) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], 0x0, 0x5, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x19) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000080)={'syztnl2\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7, 0x700, 0x4, 0xb0, {{0x1b, 0x4, 0x2, 0x16, 0x6c, 0x68, 0x0, 0x39, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xa}, {[@cipso={0x86, 0x38, 0x0, [{0x6, 0x12, "68d4a32700994164679705c34f818000"}, {0x5, 0x2}, {0x2, 0xa, "5d6190b9063ab191"}, {0x6, 0x6, "98c04975"}, {0x1, 0xe, "0132047577d60d8a884dc9cf"}]}, @ssrr={0x89, 0x1f, 0xbc, [@dev={0xac, 0x14, 0x14, 0x22}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @rand_addr=0x64010100, @remote, @local, @dev={0xac, 0x14, 0x14, 0x24}]}]}}}}}) 00:12:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x9, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x8, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit, @ldst={0x0, 0x2, 0x0, 0x2, 0x7, 0x2, 0xfffffffffffffffc}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 5: socket(0x1, 0x0, 0xffffff3f) 00:12:01 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x1347, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x2a, &(0x7f0000000340)=""/42, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:01 executing program 5: socket(0x1, 0x0, 0x0) 00:12:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:01 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001040)={r0, 0xfffffffffffffffe, &(0x7f0000000040)=""/4096}, 0x20) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000001080)='./binderfs2/binder1\x00', 0x800, 0x0) r2 = mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r3 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r3, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000015c0)={&(0x7f00000010c0)="64072d2c7dd8ee1b0f97698660b8b3f17e84ebc02059b7b408c0135672", &(0x7f0000001440)=""/238, &(0x7f0000001100)="d6400ec95ce50aa5dbb45861b1029923bca8664c874e9620aad0b6df516bd23d412387102c0b2a5111479b420a05c260b3cb0e8dd398122ae7f3be323d53e731", &(0x7f0000001540)="64dd8c7fe77fe7d8ac4e22b679e1f96a603e4223333252fcaa5156533896a5e61db172256e9ecd2f67537b618141d5a6d96efe75f739ebb8ab1b5258a5d1a45b69dea9e207349259a5ce7321172e33bab38c2b03af7fd552f717e70bf9dcb628c1cb80a5c0310f1c8742d3463ea486c7edc8e754ff6a8557e6aead996a", 0x3, r4, 0x4}, 0x38) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000012c0)={0x58, 0x0, &(0x7f0000001180)=[@increfs={0x40046304, 0x3}, @free_buffer={0x40086303, r2}, @transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x58, 0x18, &(0x7f0000001300)=ANY=[@ANYBLOB="8561646600000000090000000000000002000000000000000000852a68770010000003856164660000000003000000000000000200000000000000190000000000000000000000000000000000000000000051ac9589fbd90de36f6f580e165518834569db12b7641588a54b74c702dfb8eb515d7da9bae2f14462853d26726864f8116ec2f8498df9686d6ca4981c4f7dc82aaca4ab70964c0ba8df4497b8006f1ed7e1edfef72b8e72494148e0562542d98e0f5ff874bd9d191f65d9ce3b981f2dbbab7928f401b7a330ec32e604f4fd9689edfbb7e0658992a1cf531672e842c5b4a3a05f6b6d83753ca303124fa6e981e3501e97f241716c172d84e36b5fcca2b61f0427b0ee4e69d2127448366c1fcfd0638894ef31aa175b3cf0279973b30d000000000000"], &(0x7f0000001140)={0x0, 0x20, 0x38}}}], 0x97, 0x0, &(0x7f0000001200)="ac7a8883a01224af7bd9bb3f4dbffdef5092d5d18c5943095c88885db46653befdbe4a01156a6ca2fd3e67747f840adf1487173b3ed2aec59eb60b61204ccfbb6b252f1252e9765c08210babbb67e3d9373d94e8919298f0d7f27edcbdcceb58ea58655299cc8653925ff316a7abf2dfacbd1e6490dc022b0292cecb14ccb6b9c08aa66bb7ef6abd53a9b81138c1892615631fb889d445"}) 00:12:02 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x19) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000080)={'syztnl2\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7, 0x700, 0x4, 0xb0, {{0x1b, 0x4, 0x2, 0x16, 0x6c, 0x68, 0x0, 0x39, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xa}, {[@cipso={0x86, 0x38, 0x0, [{0x6, 0x12, "68d4a32700994164679705c34f818000"}, {0x5, 0x2}, {0x2, 0xa, "5d6190b9063ab191"}, {0x6, 0x6, "98c04975"}, {0x1, 0xe, "0132047577d60d8a884dc9cf"}]}, @ssrr={0x89, 0x1f, 0xbc, [@dev={0xac, 0x14, 0x14, 0x22}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @rand_addr=0x64010100, @remote, @local, @dev={0xac, 0x14, 0x14, 0x24}]}]}}}}}) 00:12:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 5: socket(0x1, 0x0, 0x0) 00:12:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001040)={r0, 0xfffffffffffffffe, &(0x7f0000000040)=""/4096}, 0x20) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000001080)='./binderfs2/binder1\x00', 0x800, 0x0) r2 = mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r3 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r3, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000015c0)={&(0x7f00000010c0)="64072d2c7dd8ee1b0f97698660b8b3f17e84ebc02059b7b408c0135672", &(0x7f0000001440)=""/238, &(0x7f0000001100)="d6400ec95ce50aa5dbb45861b1029923bca8664c874e9620aad0b6df516bd23d412387102c0b2a5111479b420a05c260b3cb0e8dd398122ae7f3be323d53e731", &(0x7f0000001540)="64dd8c7fe77fe7d8ac4e22b679e1f96a603e4223333252fcaa5156533896a5e61db172256e9ecd2f67537b618141d5a6d96efe75f739ebb8ab1b5258a5d1a45b69dea9e207349259a5ce7321172e33bab38c2b03af7fd552f717e70bf9dcb628c1cb80a5c0310f1c8742d3463ea486c7edc8e754ff6a8557e6aead996a", 0x3, r4, 0x4}, 0x38) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000012c0)={0x58, 0x0, &(0x7f0000001180)=[@increfs={0x40046304, 0x3}, @free_buffer={0x40086303, r2}, @transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x58, 0x18, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], &(0x7f0000001140)={0x0, 0x20, 0x38}}}], 0x97, 0x0, &(0x7f0000001200)="ac7a8883a01224af7bd9bb3f4dbffdef5092d5d18c5943095c88885db46653befdbe4a01156a6ca2fd3e67747f840adf1487173b3ed2aec59eb60b61204ccfbb6b252f1252e9765c08210babbb67e3d9373d94e8919298f0d7f27edcbdcceb58ea58655299cc8653925ff316a7abf2dfacbd1e6490dc022b0292cecb14ccb6b9c08aa66bb7ef6abd53a9b81138c1892615631fb889d445"}) 00:12:02 executing program 5: socket(0x1, 0x0, 0x0) 00:12:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x4}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x1597, 0x0, 0x9, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:02 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001040)={r0, 0xfffffffffffffffe, &(0x7f0000000040)=""/4096}, 0x20) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000001080)='./binderfs2/binder1\x00', 0x800, 0x0) r2 = mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r3 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r3, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000015c0)={&(0x7f00000010c0)="64072d2c7dd8ee1b0f97698660b8b3f17e84ebc02059b7b408c0135672", &(0x7f0000001440)=""/238, &(0x7f0000001100)="d6400ec95ce50aa5dbb45861b1029923bca8664c874e9620aad0b6df516bd23d412387102c0b2a5111479b420a05c260b3cb0e8dd398122ae7f3be323d53e731", &(0x7f0000001540)="64dd8c7fe77fe7d8ac4e22b679e1f96a603e4223333252fcaa5156533896a5e61db172256e9ecd2f67537b618141d5a6d96efe75f739ebb8ab1b5258a5d1a45b69dea9e207349259a5ce7321172e33bab38c2b03af7fd552f717e70bf9dcb628c1cb80a5c0310f1c8742d3463ea486c7edc8e754ff6a8557e6aead996a", 0x3, r4, 0x4}, 0x38) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000012c0)={0x58, 0x0, &(0x7f0000001180)=[@increfs={0x40046304, 0x3}, @free_buffer={0x40086303, r2}, @transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x58, 0x18, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], &(0x7f0000001140)={0x0, 0x20, 0x38}}}], 0x97, 0x0, &(0x7f0000001200)="ac7a8883a01224af7bd9bb3f4dbffdef5092d5d18c5943095c88885db46653befdbe4a01156a6ca2fd3e67747f840adf1487173b3ed2aec59eb60b61204ccfbb6b252f1252e9765c08210babbb67e3d9373d94e8919298f0d7f27edcbdcceb58ea58655299cc8653925ff316a7abf2dfacbd1e6490dc022b0292cecb14ccb6b9c08aa66bb7ef6abd53a9b81138c1892615631fb889d445"}) 00:12:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x19) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000080)={'syztnl2\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7, 0x700, 0x4, 0xb0, {{0x1b, 0x4, 0x2, 0x16, 0x6c, 0x68, 0x0, 0x39, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xa}, {[@cipso={0x86, 0x38, 0x0, [{0x6, 0x12, "68d4a32700994164679705c34f818000"}, {0x5, 0x2}, {0x2, 0xa, "5d6190b9063ab191"}, {0x6, 0x6, "98c04975"}, {0x1, 0xe, "0132047577d60d8a884dc9cf"}]}, @ssrr={0x89, 0x1f, 0xbc, [@dev={0xac, 0x14, 0x14, 0x22}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @rand_addr=0x64010100, @remote, @local, @dev={0xac, 0x14, 0x14, 0x24}]}]}}}}}) 00:12:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 5: bpf$MAP_DELETE_BATCH(0x15, 0x0, 0x26) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180), 0x90000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x9, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @ldst={0x2, 0x0, 0x1, 0x1, 0x8, 0x20, 0x1}, @jmp={0x5, 0x0, 0xd, 0x5, 0xb, 0xfffffffffffffff4, 0x10}, @alu={0x4, 0x0, 0x4, 0x5, 0x0, 0x8, 0x4}, @alu={0x4, 0x1, 0xa, 0x3, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, r0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) 00:12:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001040)={r0, 0xfffffffffffffffe, &(0x7f0000000040)=""/4096}, 0x20) openat$binderfs(0xffffffffffffff9c, &(0x7f0000001080)='./binderfs2/binder1\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000015c0)={&(0x7f00000010c0)="64072d2c7dd8ee1b0f97698660b8b3f17e84ebc02059b7b408c0135672", &(0x7f0000001440)=""/238, &(0x7f0000001100)="d6400ec95ce50aa5dbb45861b1029923bca8664c874e9620aad0b6df516bd23d412387102c0b2a5111479b420a05c260b3cb0e8dd398122ae7f3be323d53e731", &(0x7f0000001540)="64dd8c7fe77fe7d8ac4e22b679e1f96a603e4223333252fcaa5156533896a5e61db172256e9ecd2f67537b618141d5a6d96efe75f739ebb8ab1b5258a5d1a45b69dea9e207349259a5ce7321172e33bab38c2b03af7fd552f717e70bf9dcb628c1cb80a5c0310f1c8742d3463ea486c7edc8e754ff6a8557e6aead996a", 0x3, r2, 0x4}, 0x38) 00:12:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x1000, 0x7}, 0x10, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x0, &(0x7f0000000000), &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2fa97, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001040)={r0, 0xfffffffffffffffe, &(0x7f0000000040)=""/4096}, 0x20) openat$binderfs(0xffffffffffffff9c, &(0x7f0000001080)='./binderfs2/binder1\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) 00:12:02 executing program 5: bpf$MAP_DELETE_BATCH(0x15, 0x0, 0x26) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180), 0x90000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x9, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @ldst={0x2, 0x0, 0x1, 0x1, 0x8, 0x20, 0x1}, @jmp={0x5, 0x0, 0xd, 0x5, 0xb, 0xfffffffffffffff4, 0x10}, @alu={0x4, 0x0, 0x4, 0x5, 0x0, 0x8, 0x4}, @alu={0x4, 0x1, 0xa, 0x3, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, r0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) 00:12:02 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x19) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl2\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7, 0x700, 0x4, 0xb0, {{0x1b, 0x4, 0x2, 0x16, 0x6c, 0x68, 0x0, 0x39, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xa}, {[@cipso={0x86, 0x38, 0x0, [{0x6, 0x12, "68d4a32700994164679705c34f818000"}, {0x5, 0x2}, {0x2, 0xa, "5d6190b9063ab191"}, {0x6, 0x6, "98c04975"}, {0x1, 0xe, "0132047577d60d8a884dc9cf"}]}, @ssrr={0x89, 0x1f, 0xbc, [@dev={0xac, 0x14, 0x14, 0x22}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @rand_addr=0x64010100, @remote, @local, @dev={0xac, 0x14, 0x14, 0x24}]}]}}}}}) 00:12:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x0, &(0x7f0000000000), &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001040)={r0, 0xfffffffffffffffe, &(0x7f0000000040)=""/4096}, 0x20) openat$binderfs(0xffffffffffffff9c, &(0x7f0000001080)='./binderfs2/binder1\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) 00:12:02 executing program 5: bpf$MAP_DELETE_BATCH(0x15, 0x0, 0x26) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180), 0x90000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x9, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @ldst={0x2, 0x0, 0x1, 0x1, 0x8, 0x20, 0x1}, @jmp={0x5, 0x0, 0xd, 0x5, 0xb, 0xfffffffffffffff4, 0x10}, @alu={0x4, 0x0, 0x4, 0x5, 0x0, 0x8, 0x4}, @alu={0x4, 0x1, 0xa, 0x3, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, r0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) 00:12:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x0, &(0x7f0000000000), &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x19) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl2\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7, 0x700, 0x4, 0xb0, {{0x1b, 0x4, 0x2, 0x16, 0x6c, 0x68, 0x0, 0x39, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xa}, {[@cipso={0x86, 0x38, 0x0, [{0x6, 0x12, "68d4a32700994164679705c34f818000"}, {0x5, 0x2}, {0x2, 0xa, "5d6190b9063ab191"}, {0x6, 0x6, "98c04975"}, {0x1, 0xe, "0132047577d60d8a884dc9cf"}]}, @ssrr={0x89, 0x1f, 0xbc, [@dev={0xac, 0x14, 0x14, 0x22}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @rand_addr=0x64010100, @remote, @local, @dev={0xac, 0x14, 0x14, 0x24}]}]}}}}}) 00:12:02 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001040)={r0, 0xfffffffffffffffe, &(0x7f0000000040)=""/4096}, 0x20) openat$binderfs(0xffffffffffffff9c, &(0x7f0000001080)='./binderfs2/binder1\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x7f, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_ext={0x1c, 0x2, &(0x7f00000002c0)=@raw=[@cb_func], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:02 executing program 5: bpf$MAP_DELETE_BATCH(0x15, 0x0, 0x26) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180), 0x90000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x9, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @ldst={0x2, 0x0, 0x1, 0x1, 0x8, 0x20, 0x1}, @jmp={0x5, 0x0, 0xd, 0x5, 0xb, 0xfffffffffffffff4, 0x10}, @alu={0x4, 0x0, 0x4, 0x5, 0x0, 0x8, 0x4}, @alu={0x4, 0x1, 0xa, 0x3, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, r0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x19) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl2\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7, 0x700, 0x4, 0xb0, {{0x1b, 0x4, 0x2, 0x16, 0x6c, 0x68, 0x0, 0x39, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xa}, {[@cipso={0x86, 0x38, 0x0, [{0x6, 0x12, "68d4a32700994164679705c34f818000"}, {0x5, 0x2}, {0x2, 0xa, "5d6190b9063ab191"}, {0x6, 0x6, "98c04975"}, {0x1, 0xe, "0132047577d60d8a884dc9cf"}]}, @ssrr={0x89, 0x1f, 0xbc, [@dev={0xac, 0x14, 0x14, 0x22}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @rand_addr=0x64010100, @remote, @local, @dev={0xac, 0x14, 0x14, 0x24}]}]}}}}}) 00:12:02 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = syz_open_dev$loop(&(0x7f0000000100), 0x1, 0x20400) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000000180)={r3, 0x1, {0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0xa, 0x17, 0x1, "cfb9e4c2df1658aad495eb440305b1260e5f979052485dafe6706b94f36e1b71b530456a5b623b41b270d9c7642de155e48aa19b8ec73c3931937b8ee30f975f", "0b00516f259c3291174d33d1afc35abc9b18f3ae27dbf9ec334888cb724f0127ac7dabbb54dbdf776459b177e37df78dafc0d5be35d46338f7e1fe3d26308fde", "a0b22b097c191b566752bf84e44465db2268963690c8df7953b056cce242e6d2", [0x1, 0x100]}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) setsockopt$MRT_INIT(0xffffffffffffffff, 0x0, 0xc8, &(0x7f0000000080), 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3ff, 0x3, 0x80000000, 0x40, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x2}, 0x48) 00:12:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x23, &(0x7f00000000c0)=""/35, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001040)={r0, 0xfffffffffffffffe, &(0x7f0000000040)=""/4096}, 0x20) openat$binderfs(0xffffffffffffff9c, &(0x7f0000001080)='./binderfs2/binder1\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:02 executing program 5: bpf$MAP_DELETE_BATCH(0x15, 0x0, 0x26) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x9, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @ldst={0x2, 0x0, 0x1, 0x1, 0x8, 0x20, 0x1}, @jmp={0x5, 0x0, 0xd, 0x5, 0xb, 0xfffffffffffffff4, 0x10}, @alu={0x4, 0x0, 0x4, 0x5, 0x0, 0x8, 0x4}, @alu={0x4, 0x1, 0xa, 0x3, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000080)={'syztnl2\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7, 0x700, 0x4, 0xb0, {{0x1b, 0x4, 0x2, 0x16, 0x6c, 0x68, 0x0, 0x39, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xa}, {[@cipso={0x86, 0x38, 0x0, [{0x6, 0x12, "68d4a32700994164679705c34f818000"}, {0x5, 0x2}, {0x2, 0xa, "5d6190b9063ab191"}, {0x6, 0x6, "98c04975"}, {0x1, 0xe, "0132047577d60d8a884dc9cf"}]}, @ssrr={0x89, 0x1f, 0xbc, [@dev={0xac, 0x14, 0x14, 0x22}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @rand_addr=0x64010100, @remote, @local, @dev={0xac, 0x14, 0x14, 0x24}]}]}}}}}) 00:12:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = syz_open_dev$loop(&(0x7f0000000100), 0x1, 0x20400) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000000180)={r3, 0x1, {0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0xa, 0x17, 0x1, "cfb9e4c2df1658aad495eb440305b1260e5f979052485dafe6706b94f36e1b71b530456a5b623b41b270d9c7642de155e48aa19b8ec73c3931937b8ee30f975f", "0b00516f259c3291174d33d1afc35abc9b18f3ae27dbf9ec334888cb724f0127ac7dabbb54dbdf776459b177e37df78dafc0d5be35d46338f7e1fe3d26308fde", "a0b22b097c191b566752bf84e44465db2268963690c8df7953b056cce242e6d2", [0x1, 0x100]}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) setsockopt$MRT_INIT(0xffffffffffffffff, 0x0, 0xc8, &(0x7f0000000080), 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3ff, 0x3, 0x80000000, 0x40, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x2}, 0x48) 00:12:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x9, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @ldst={0x2, 0x0, 0x1, 0x1, 0x8, 0x20, 0x1}, @jmp={0x5, 0x0, 0xd, 0x5, 0xb, 0xfffffffffffffff4, 0x10}, @alu={0x4, 0x0, 0x4, 0x5, 0x0, 0x8, 0x4}, @alu={0x4, 0x1, 0xa, 0x3, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func], 0x0, 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001040)={r0, 0xfffffffffffffffe, &(0x7f0000000040)=""/4096}, 0x20) openat$binderfs(0xffffffffffffff9c, &(0x7f0000001080)='./binderfs2/binder1\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:02 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = syz_open_dev$loop(&(0x7f0000000100), 0x1, 0x20400) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000000180)={r3, 0x1, {0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0xa, 0x17, 0x1, "cfb9e4c2df1658aad495eb440305b1260e5f979052485dafe6706b94f36e1b71b530456a5b623b41b270d9c7642de155e48aa19b8ec73c3931937b8ee30f975f", "0b00516f259c3291174d33d1afc35abc9b18f3ae27dbf9ec334888cb724f0127ac7dabbb54dbdf776459b177e37df78dafc0d5be35d46338f7e1fe3d26308fde", "a0b22b097c191b566752bf84e44465db2268963690c8df7953b056cce242e6d2", [0x1, 0x100]}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) setsockopt$MRT_INIT(0xffffffffffffffff, 0x0, 0xc8, &(0x7f0000000080), 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3ff, 0x3, 0x80000000, 0x40, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x2}, 0x48) 00:12:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func], 0x0, 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001040)={r0, 0xfffffffffffffffe, &(0x7f0000000040)=""/4096}, 0x20) openat$binderfs(0xffffffffffffff9c, &(0x7f0000001080)='./binderfs2/binder1\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl2\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7, 0x700, 0x4, 0xb0, {{0x1b, 0x4, 0x2, 0x16, 0x6c, 0x68, 0x0, 0x39, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xa}, {[@cipso={0x86, 0x38, 0x0, [{0x6, 0x12, "68d4a32700994164679705c34f818000"}, {0x5, 0x2}, {0x2, 0xa, "5d6190b9063ab191"}, {0x6, 0x6, "98c04975"}, {0x1, 0xe, "0132047577d60d8a884dc9cf"}]}, @ssrr={0x89, 0x1f, 0xbc, [@dev={0xac, 0x14, 0x14, 0x22}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @rand_addr=0x64010100, @remote, @local, @dev={0xac, 0x14, 0x14, 0x24}]}]}}}}}) 00:12:02 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:02 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = syz_open_dev$loop(&(0x7f0000000100), 0x1, 0x20400) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000000180)={r3, 0x1, {0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0xa, 0x17, 0x1, "cfb9e4c2df1658aad495eb440305b1260e5f979052485dafe6706b94f36e1b71b530456a5b623b41b270d9c7642de155e48aa19b8ec73c3931937b8ee30f975f", "0b00516f259c3291174d33d1afc35abc9b18f3ae27dbf9ec334888cb724f0127ac7dabbb54dbdf776459b177e37df78dafc0d5be35d46338f7e1fe3d26308fde", "a0b22b097c191b566752bf84e44465db2268963690c8df7953b056cce242e6d2", [0x1, 0x100]}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) setsockopt$MRT_INIT(0xffffffffffffffff, 0x0, 0xc8, &(0x7f0000000080), 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) 00:12:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func], 0x0, 0x1f, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001040)={r0, 0xfffffffffffffffe, &(0x7f0000000040)=""/4096}, 0x20) openat$binderfs(0xffffffffffffff9c, &(0x7f0000001080)='./binderfs2/binder1\x00', 0x800, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:02 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl2\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7, 0x700, 0x4, 0xb0, {{0x1b, 0x4, 0x2, 0x16, 0x6c, 0x68, 0x0, 0x39, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xa}, {[@cipso={0x86, 0x38, 0x0, [{0x6, 0x12, "68d4a32700994164679705c34f818000"}, {0x5, 0x2}, {0x2, 0xa, "5d6190b9063ab191"}, {0x6, 0x6, "98c04975"}, {0x1, 0xe, "0132047577d60d8a884dc9cf"}]}, @ssrr={0x89, 0x1f, 0xbc, [@dev={0xac, 0x14, 0x14, 0x22}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @rand_addr=0x64010100, @remote, @local, @dev={0xac, 0x14, 0x14, 0x24}]}]}}}}}) 00:12:02 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:02 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = syz_open_dev$loop(&(0x7f0000000100), 0x1, 0x20400) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000000180)={r3, 0x1, {0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0xa, 0x17, 0x1, "cfb9e4c2df1658aad495eb440305b1260e5f979052485dafe6706b94f36e1b71b530456a5b623b41b270d9c7642de155e48aa19b8ec73c3931937b8ee30f975f", "0b00516f259c3291174d33d1afc35abc9b18f3ae27dbf9ec334888cb724f0127ac7dabbb54dbdf776459b177e37df78dafc0d5be35d46338f7e1fe3d26308fde", "a0b22b097c191b566752bf84e44465db2268963690c8df7953b056cce242e6d2", [0x1, 0x100]}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) setsockopt$MRT_INIT(0xffffffffffffffff, 0x0, 0xc8, &(0x7f0000000080), 0x4) 00:12:02 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001040)={r0, 0xfffffffffffffffe, &(0x7f0000000040)=""/4096}, 0x20) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:02 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl2\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7, 0x700, 0x4, 0xb0, {{0x1b, 0x4, 0x2, 0x16, 0x6c, 0x68, 0x0, 0x39, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xa}, {[@cipso={0x86, 0x38, 0x0, [{0x6, 0x12, "68d4a32700994164679705c34f818000"}, {0x5, 0x2}, {0x2, 0xa, "5d6190b9063ab191"}, {0x6, 0x6, "98c04975"}, {0x1, 0xe, "0132047577d60d8a884dc9cf"}]}, @ssrr={0x89, 0x1f, 0xbc, [@dev={0xac, 0x14, 0x14, 0x22}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @rand_addr=0x64010100, @remote, @local, @dev={0xac, 0x14, 0x14, 0x24}]}]}}}}}) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x9, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @ldst={0x2, 0x0, 0x1, 0x1, 0x8, 0x20, 0x1}, @jmp={0x5, 0x0, 0xd, 0x5, 0xb, 0xfffffffffffffff4, 0x10}, @alu={0x4, 0x0, 0x4, 0x5, 0x0, 0x8, 0x4}, @alu={0x4, 0x1, 0xa, 0x3, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x101, 0x18}, 0xc) r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0x1, 0x7f, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:03 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = syz_open_dev$loop(&(0x7f0000000100), 0x1, 0x20400) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000000180)={r3, 0x1, {0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0xa, 0x17, 0x1, "cfb9e4c2df1658aad495eb440305b1260e5f979052485dafe6706b94f36e1b71b530456a5b623b41b270d9c7642de155e48aa19b8ec73c3931937b8ee30f975f", "0b00516f259c3291174d33d1afc35abc9b18f3ae27dbf9ec334888cb724f0127ac7dabbb54dbdf776459b177e37df78dafc0d5be35d46338f7e1fe3d26308fde", "a0b22b097c191b566752bf84e44465db2268963690c8df7953b056cce242e6d2", [0x1, 0x100]}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 00:12:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 00:12:03 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) bpf$MAP_DELETE_BATCH(0x2, 0x0, 0xffffffcd) r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x9, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @ldst={0x2, 0x0, 0x1, 0x1, 0x8, 0x20, 0x1}, @jmp={0x5, 0x0, 0xd, 0x5, 0xb, 0xfffffffffffffff4, 0x10}, @alu={0x4, 0x0, 0x4, 0x5, 0x0, 0x8, 0x4}, @alu={0x4, 0x1, 0xa, 0x3, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 00:12:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 00:12:03 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_open_dev$loop(&(0x7f0000000100), 0x1, 0x20400) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000180)={r1, 0x1, {0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0xa, 0x17, 0x1, "cfb9e4c2df1658aad495eb440305b1260e5f979052485dafe6706b94f36e1b71b530456a5b623b41b270d9c7642de155e48aa19b8ec73c3931937b8ee30f975f", "0b00516f259c3291174d33d1afc35abc9b18f3ae27dbf9ec334888cb724f0127ac7dabbb54dbdf776459b177e37df78dafc0d5be35d46338f7e1fe3d26308fde", "a0b22b097c191b566752bf84e44465db2268963690c8df7953b056cce242e6d2", [0x1, 0x100]}}) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x9, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @ldst={0x2, 0x0, 0x1, 0x1, 0x8, 0x20, 0x1}, @jmp={0x5, 0x0, 0xd, 0x5, 0xb, 0xfffffffffffffff4, 0x10}, @alu={0x4, 0x0, 0x4, 0x5, 0x0, 0x8, 0x4}, @alu={0x4, 0x1, 0xa, 0x3, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 00:12:03 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000002b80)={0x2c, "5474e1eea3d65d798a03c69d911ce0d829820d9850415a746d44bbd5817267c1ca297b6522b471853f34840d29a24b0a9dafbda137f97a55de79447ebad818039d99921d0f8d14c3f3c89c3b11eac08dabd48951aa75157fbf0e58a1f8c0005c670b6a3465cc673fafb6edd961903e8744606242a092fd31561b98b413423f39"}) r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 00:12:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_open_dev$loop(&(0x7f0000000100), 0x1, 0x20400) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:03 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}, 0x300}, 0x0) 00:12:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000080)={'syztnl2\x00', 0x0}) 00:12:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0xfffffffe, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 1: socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}, 0x300}, 0x0) 00:12:03 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) 00:12:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 1: socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:03 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) 00:12:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x2, &(0x7f0000000000)=@raw=[@cb_func], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:03 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}, 0x300}, 0x0) 00:12:03 executing program 0: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}, 0x300}, 0x0) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x8, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @ldst={0x2, 0x0, 0x1, 0x1, 0x8, 0x20, 0x1}, @jmp={0x5, 0x0, 0xd, 0x5, 0xb, 0xfffffffffffffff4, 0x10}, @alu={0x4, 0x0, 0x4, 0x5, 0x0, 0x8, 0x4}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) 00:12:03 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0x33fe0}}, 0x0) 00:12:03 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) r0 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x700, 0x5, 0x9, {{0x12, 0x4, 0x3, 0x22, 0x48, 0x66, 0x0, 0x5, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x34, 0xf6, 0x1, 0x5, [{@multicast1, 0x5}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@local, 0x6}, {@multicast2, 0x7fffffff}, {@local, 0x40}]}]}}}}}) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r2, @ANYBLOB="00042abd7000fddbdf250f00000008000600", @ANYRES32=r3, @ANYBLOB="050035007f00000008003900ff0000000800320003000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x24010881) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r5, 0x5206, &(0x7f00000003c0)=0x9) connect$x25(r4, &(0x7f0000000340), 0x12) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00082bbd7000fddbdf250200000006000a004e21000008000b00", @ANYRES32=0x0, @ANYBLOB="2900f000", @ANYRES32=0x0, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x4048854}, 0x4000004) 00:12:03 executing program 1: socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f0000001600)=@pptp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x7, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @ldst={0x2, 0x0, 0x1, 0x1, 0x8, 0x20, 0x1}, @jmp={0x5, 0x0, 0xd, 0x5, 0xb, 0xfffffffffffffff4, 0x10}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 0: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}, 0x300}, 0x0) 00:12:03 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) 00:12:03 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0x33fe0}}, 0x0) 00:12:03 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) r0 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x700, 0x5, 0x9, {{0x12, 0x4, 0x3, 0x22, 0x48, 0x66, 0x0, 0x5, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x34, 0xf6, 0x1, 0x5, [{@multicast1, 0x5}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@local, 0x6}, {@multicast2, 0x7fffffff}, {@local, 0x40}]}]}}}}}) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r2, @ANYBLOB="00042abd7000fddbdf250f00000008000600", @ANYRES32=r3, @ANYBLOB="050035007f00000008003900ff0000000800320003000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x24010881) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r5, 0x5206, &(0x7f00000003c0)=0x9) connect$x25(r4, &(0x7f0000000340), 0x12) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00082bbd7000fddbdf250200000006000a004e21000008000b00", @ANYRES32=0x0, @ANYBLOB="2900f000", @ANYRES32=0x0, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x4048854}, 0x4000004) 00:12:03 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, 0x0, 0x40000002) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x6, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @ldst={0x2, 0x0, 0x1, 0x1, 0x8, 0x20, 0x1}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 0: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}, 0x300}, 0x0) 00:12:03 executing program 3: syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x20000) 00:12:03 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0x33fe0}}, 0x0) 00:12:03 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, 0x0, 0x40000002) 00:12:03 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) r0 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x700, 0x5, 0x9, {{0x12, 0x4, 0x3, 0x22, 0x48, 0x66, 0x0, 0x5, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x34, 0xf6, 0x1, 0x5, [{@multicast1, 0x5}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@local, 0x6}, {@multicast2, 0x7fffffff}, {@local, 0x40}]}]}}}}}) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r2, @ANYBLOB="00042abd7000fddbdf250f00000008000600", @ANYRES32=r3, @ANYBLOB="050035007f00000008003900ff0000000800320003000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x24010881) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r5, 0x5206, &(0x7f00000003c0)=0x9) connect$x25(r4, &(0x7f0000000340), 0x12) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00082bbd7000fddbdf250200000006000a004e21000008000b00", @ANYRES32=0x0, @ANYBLOB="2900f000", @ANYRES32=0x0, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x4048854}, 0x4000004) 00:12:03 executing program 0: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}, 0x300}, 0x0) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x5, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 3: syz_open_dev$loop(0x0, 0x9, 0x20000) 00:12:03 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, 0x0, 0x40000002) 00:12:03 executing program 0: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}, 0x300}, 0x0) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x3, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 2: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0x33fe0}}, 0x0) 00:12:03 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x700, 0x5, 0x9, {{0x12, 0x4, 0x3, 0x22, 0x48, 0x66, 0x0, 0x5, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x34, 0xf6, 0x1, 0x5, [{@multicast1, 0x5}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@local, 0x6}, {@multicast2, 0x7fffffff}, {@local, 0x40}]}]}}}}}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r1, @ANYBLOB="00042abd7000fddbdf250f00000008000600", @ANYRES32=r2, @ANYBLOB="050035007f00000008003900ff0000000800320003000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x24010881) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r4, 0x5206, &(0x7f00000003c0)=0x9) connect$x25(r3, &(0x7f0000000340), 0x12) 00:12:03 executing program 3: syz_open_dev$loop(0x0, 0x9, 0x20000) 00:12:03 executing program 0: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}, 0x300}, 0x0) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/159, 0x9f}, {&(0x7f0000001740)=""/222, 0xde}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/80, 0x50}], 0x6, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:03 executing program 2: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0x33fe0}}, 0x0) 00:12:03 executing program 3: syz_open_dev$loop(0x0, 0x9, 0x20000) 00:12:03 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x700, 0x5, 0x9, {{0x12, 0x4, 0x3, 0x22, 0x48, 0x66, 0x0, 0x5, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x34, 0xf6, 0x1, 0x5, [{@multicast1, 0x5}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@local, 0x6}, {@multicast2, 0x7fffffff}, {@local, 0x40}]}]}}}}}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r1, @ANYBLOB="00042abd7000fddbdf250f00000008000600", @ANYRES32=r2, @ANYBLOB="050035007f00000008003900ff0000000800320003000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x24010881) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r4, 0x5206, &(0x7f00000003c0)=0x9) 00:12:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x0, &(0x7f0000000000), &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:03 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:03 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002ac0)=""/77, 0x4d}, 0x40000002) 00:12:03 executing program 2: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0x33fe0}}, 0x0) 00:12:03 executing program 3: syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x20000) 00:12:03 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x700, 0x5, 0x9, {{0x12, 0x4, 0x3, 0x22, 0x48, 0x66, 0x0, 0x5, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x34, 0xf6, 0x1, 0x5, [{@multicast1, 0x5}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@local, 0x6}, {@multicast2, 0x7fffffff}, {@local, 0x40}]}]}}}}}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r1, @ANYBLOB="00042abd7000fddbdf250f00000008000600", @ANYRES32=r2, @ANYBLOB="050035007f00000008003900ff0000000800320003000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x24010881) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000003c0)=0x9) 00:12:03 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x0, &(0x7f0000000000), &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:04 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x40000002) 00:12:04 executing program 2: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0x33fe0}}, 0x0) 00:12:04 executing program 3: syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x20000) 00:12:04 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x700, 0x5, 0x9, {{0x12, 0x4, 0x3, 0x22, 0x48, 0x66, 0x0, 0x5, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x34, 0xf6, 0x1, 0x5, [{@multicast1, 0x5}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@local, 0x6}, {@multicast2, 0x7fffffff}, {@local, 0x40}]}]}}}}}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r1, @ANYBLOB="00042abd7000fddbdf250f00000008000600", @ANYRES32=r2, @ANYBLOB="050035007f00000008003900ff0000000800320003000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x24010881) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000003c0)=0x9) 00:12:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x0, &(0x7f0000000000), &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:04 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:04 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x0) 00:12:04 executing program 2: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0x33fe0}}, 0x0) 00:12:04 executing program 3: syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x20000) 00:12:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x4}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:04 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:12:04 executing program 2: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0x33fe0}}, 0x0) 00:12:04 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x700, 0x5, 0x9, {{0x12, 0x4, 0x3, 0x22, 0x48, 0x66, 0x0, 0x5, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x34, 0xf6, 0x1, 0x5, [{@multicast1, 0x5}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@local, 0x6}, {@multicast2, 0x7fffffff}, {@local, 0x40}]}]}}}}}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r1, @ANYBLOB="00042abd7000fddbdf250f00000008000600", @ANYRES32=r2, @ANYBLOB="050035007f00000008003900ff0000000800320003000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x24010881) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000003c0)=0x9) 00:12:04 executing program 3: syz_open_dev$loop(&(0x7f00000000c0), 0x9, 0x0) 00:12:04 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:04 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:12:04 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:12:04 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x0) 00:12:04 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x700, 0x5, 0x9, {{0x12, 0x4, 0x3, 0x22, 0x48, 0x66, 0x0, 0x5, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x34, 0xf6, 0x1, 0x5, [{@multicast1, 0x5}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@local, 0x6}, {@multicast2, 0x7fffffff}, {@local, 0x40}]}]}}}}}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r1, @ANYBLOB="00042abd7000fddbdf250f00000008000600", @ANYRES32=r2, @ANYBLOB="050035007f00000008003900ff0000000800320003000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x24010881) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f00000003c0)=0x9) 00:12:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id], 0x0, 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:04 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:12:04 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:04 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:12:04 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:12:05 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:05 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x300}, 0x0) 00:12:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id], 0x0, 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:05 executing program 3: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:12:05 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x700, 0x5, 0x9, {{0x12, 0x4, 0x3, 0x22, 0x48, 0x66, 0x0, 0x5, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x34, 0xf6, 0x1, 0x5, [{@multicast1, 0x5}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@local, 0x6}, {@multicast2, 0x7fffffff}, {@local, 0x40}]}]}}}}}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r1, @ANYBLOB="00042abd7000fddbdf250f00000008000600", @ANYRES32=r2, @ANYBLOB="050035007f00000008003900ff0000000800320003000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x24010881) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f00000003c0)=0x9) 00:12:05 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x0) 00:12:05 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id], 0x0, 0x8, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:05 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x0) 00:12:05 executing program 3: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:12:05 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x700, 0x5, 0x9, {{0x12, 0x4, 0x3, 0x22, 0x48, 0x66, 0x0, 0x5, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x34, 0xf6, 0x1, 0x5, [{@multicast1, 0x5}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@local, 0x6}, {@multicast2, 0x7fffffff}, {@local, 0x40}]}]}}}}}) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f00000003c0)=0x9) 00:12:05 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:05 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f00000003c0)=0x9) 00:12:05 executing program 3: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:12:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, &(0x7f00000000c0), 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:05 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f00000003c0)=0x9) 00:12:05 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:06 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x0) 00:12:06 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:12:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:06 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000003c0)=0x9) 00:12:06 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:06 executing program 1: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x20, 0x700, 0x5, 0x9, {{0x12, 0x4, 0x3, 0x22, 0x48, 0x66, 0x0, 0x5, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x34, 0xf6, 0x1, 0x5, [{@multicast1, 0x5}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@local, 0x6}, {@multicast2, 0x7fffffff}, {@local, 0x40}]}]}}}}}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r1, @ANYBLOB="00042abd7000fddbdf250f00000008000600", @ANYRES32=r2, @ANYBLOB="050035007f00000008003900ff0000000800320003000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x24010881) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000003c0)=0x9) 00:12:06 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:06 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:12:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:06 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000003c0)=0x9) 00:12:06 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:12:06 executing program 4: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x1c) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000003c0)=0x9) 00:12:07 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x0) 00:12:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:07 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:07 executing program 1: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00', 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700), 0x400101, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', r0, 0xc, r1, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, r2, r3, 0x0, &(0x7f0000000740)=[r4]}, 0x80) 00:12:07 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:07 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x103, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000003c0)=0x9) 00:12:07 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:07 executing program 1: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00', 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700), 0x400101, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', r0, 0xc, r1, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, r2, r3, 0x0, &(0x7f0000000740)=[r4]}, 0x80) 00:12:07 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00', 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700), 0x400101, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', r0, 0xc, r1, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, r2, r3, 0x0, &(0x7f0000000740)=[r4]}, 0x80) 00:12:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:07 executing program 4: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x103, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000003c0)=0x9) 00:12:07 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:07 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00', 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700), 0x400101, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', r0, 0xc, r1, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, r2, r3, 0x0, &(0x7f0000000740)=[r4]}, 0x80) 00:12:08 executing program 0: recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x0) 00:12:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x3f, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:08 executing program 1: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00', 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700), 0x400101, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', r0, 0xc, r1, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, r2, r3, 0x0, &(0x7f0000000740)=[r4]}, 0x80) 00:12:08 executing program 4: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x103, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000003c0)=0x9) 00:12:08 executing program 3: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3, 0x8}, 0xc) r0 = fsmount(0xffffffffffffffff, 0x1, 0x18) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x608100, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:12:08 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00', 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700), 0x400101, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', r0, 0xc, r1, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, r2, r3, 0x0, &(0x7f0000000740)=[r4]}, 0x80) 00:12:08 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00'}) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700), 0x400101, 0x0) 00:12:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) 00:12:08 executing program 1: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00', 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', r0, 0xc, r1, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, r2, r3, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:08 executing program 4: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x103, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000003c0)=0x9) 00:12:08 executing program 3: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3, 0x8}, 0xc) r0 = fsmount(0xffffffffffffffff, 0x1, 0x18) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x608100, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:12:08 executing program 0: recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x0) 00:12:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:08 executing program 3: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3, 0x8}, 0xc) r0 = fsmount(0xffffffffffffffff, 0x1, 0x18) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x608100, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:12:08 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00'}) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:08 executing program 1: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00', 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', r0, 0xc, r1, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:08 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000003c0)=0x9) 00:12:08 executing program 0: recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x0) 00:12:08 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x15, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:08 executing program 1: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00', 0x0}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', r0, 0xc, r1, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:08 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00'}) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:08 executing program 3: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3, 0x8}, 0xc) fsmount(0xffffffffffffffff, 0x1, 0x18) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x608100, 0x0) 00:12:08 executing program 0: socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x0) 00:12:08 executing program 4: openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000003c0)=0x9) 00:12:08 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x15, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:08 executing program 1: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', r0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:08 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'nr0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:08 executing program 0: socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x0) 00:12:08 executing program 3: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3, 0x8}, 0xc) fsmount(0xffffffffffffffff, 0x1, 0x18) 00:12:08 executing program 4: openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000003c0)=0x9) 00:12:08 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:08 executing program 1: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0xfffffffffffffefe) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:08 executing program 0: socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002b40)={0x0, 0x0, 0x0}, 0x0) 00:12:08 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x15, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:08 executing program 4: openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000003c0)=0x9) 00:12:08 executing program 3: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3, 0x8}, 0xc) 00:12:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:08 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x15, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:08 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 00:12:08 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:09 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, 0x0, 0x0) 00:12:09 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3, 0x8}, 0xc) 00:12:09 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:09 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x15, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:09 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 00:12:09 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, 0x0, 0x0) 00:12:09 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:09 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x15, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, 0x0, 0x0) 00:12:09 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:09 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 00:12:09 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:09 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x15, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:09 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0x10, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 00:12:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:09 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x15, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:09 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x8}, 0xc) 00:12:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:09 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x15, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:09 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0x10, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:09 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x3, &(0x7f0000000000)=@raw=[@exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:09 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:09 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff}, 0xc) 00:12:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:09 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0x10, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r5, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000540)={&(0x7f0000000280)="d7ea3ea8fa7e3468eafc7bce5fd412b2aabe74b3d101710852f79ac5f8938d9a8741e637d5cc4651237b8fc0e2d6d38c78a706a7e605da7f28dfe15dff21a3f0878c1b26b1d790c7e3754e2d2e05e6d12d4e9509ef6f84e5604bde51d32d7ac899c9e3d76af76c8cc38072e5061bd171d35dbf2faa618920c566590c7decd8efa7592a11b44eeb18b9695b0848f2dbf265238dbbc6050a9ccaa084de8bdd6457c031fa96d3a182c14222eb5a96cd18b1e0d05fad336ffbc68a15b7ccc6b565e410f5cea43704ab077c7a0e5aad49ac75805f35", &(0x7f0000000380)=""/67, &(0x7f0000000400)="b3af6b71b4712043c2b80b5a8e3289d518200a26cfeb6c8d39415095bc6238a9cda67432e8e473e52f74ad4cb771ab1945fe2112dc4f35d6cc8a0c04a008bb68fb38fd724e433fc306d3fb834326eb34147e0c83ffa1fb1c99d8786318c3e7e85a2174b66719c0da16e0f10da6d5dbeba89b91862c215b75be2dc575b0b633e0fc", &(0x7f00000004c0)="a5fea9954264b92fd996392b3daca760ad82ac6a9156c001fbff8782ed08cecc57c59c85f7a7d4ce9169a38502e9fb6e14843fbe447f4c5f36682dffff3b7a21d9166ef01bea90e542494f2a8d553fee47622c1dd706f29e635c87ede90894cb09", 0x7fff, r3}, 0x38) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="2c88ed069515001ff5b6e9c9e629e4000b7ee86dc15a654e3dc64e7c185bb157c3a3e7fd394229a738c33b04b6fcea31c4f2cf622d773c38e86c92e2b7157cc3739fe591003d5d1e", @ANYRES16=r2, @ANYBLOB="00002dbd7000000000000e000000080031000400000008003a00000000000500290000000000"], 0x2c}}, 0x20000004) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000007c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r7, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c0000784c0f11", @ANYRES16=r8, @ANYBLOB="010029bd7000ffdbdf25070000000800320001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4495a93375b4dbc8}, 0x8000) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100060}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="00022cbd7000fd9bdf2509000000007f00a200240000"], 0x1c}, 0x1, 0x0, 0x0, 0x40801}, 0x40000) 00:12:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:09 executing program 0: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0x10, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0xb}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:09 executing program 4: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 0: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0x10, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x0, &(0x7f0000000480), &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:09 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r5, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000540)={&(0x7f0000000280)="d7ea3ea8fa7e3468eafc7bce5fd412b2aabe74b3d101710852f79ac5f8938d9a8741e637d5cc4651237b8fc0e2d6d38c78a706a7e605da7f28dfe15dff21a3f0878c1b26b1d790c7e3754e2d2e05e6d12d4e9509ef6f84e5604bde51d32d7ac899c9e3d76af76c8cc38072e5061bd171d35dbf2faa618920c566590c7decd8efa7592a11b44eeb18b9695b0848f2dbf265238dbbc6050a9ccaa084de8bdd6457c031fa96d3a182c14222eb5a96cd18b1e0d05fad336ffbc68a15b7ccc6b565e410f5cea43704ab077c7a0e5aad49ac75805f35", &(0x7f0000000380)=""/67, &(0x7f0000000400)="b3af6b71b4712043c2b80b5a8e3289d518200a26cfeb6c8d39415095bc6238a9cda67432e8e473e52f74ad4cb771ab1945fe2112dc4f35d6cc8a0c04a008bb68fb38fd724e433fc306d3fb834326eb34147e0c83ffa1fb1c99d8786318c3e7e85a2174b66719c0da16e0f10da6d5dbeba89b91862c215b75be2dc575b0b633e0fc", &(0x7f00000004c0)="a5fea9954264b92fd996392b3daca760ad82ac6a9156c001fbff8782ed08cecc57c59c85f7a7d4ce9169a38502e9fb6e14843fbe447f4c5f36682dffff3b7a21d9166ef01bea90e542494f2a8d553fee47622c1dd706f29e635c87ede90894cb09", 0x7fff, r3}, 0x38) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="2c88ed069515001ff5b6e9c9e629e4000b7ee86dc15a654e3dc64e7c185bb157c3a3e7fd394229a738c33b04b6fcea31c4f2cf622d773c38e86c92e2b7157cc3739fe591003d5d1e", @ANYRES16=r2, @ANYBLOB="00002dbd7000000000000e000000080031000400000008003a00000000000500290000000000"], 0x2c}}, 0x20000004) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000007c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r7, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c0000784c0f11", @ANYRES16=r8, @ANYBLOB="010029bd7000ffdbdf25070000000800320001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4495a93375b4dbc8}, 0x8000) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100060}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="00022cbd7000fd9bdf2509000000007f00a200240000"], 0x1c}, 0x1, 0x0, 0x0, 0x40801}, 0x40000) 00:12:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x0, &(0x7f0000000480), &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:09 executing program 0: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0x10, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:09 executing program 4: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:09 executing program 0: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0x10, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:09 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r5, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000540)={&(0x7f0000000280)="d7ea3ea8fa7e3468eafc7bce5fd412b2aabe74b3d101710852f79ac5f8938d9a8741e637d5cc4651237b8fc0e2d6d38c78a706a7e605da7f28dfe15dff21a3f0878c1b26b1d790c7e3754e2d2e05e6d12d4e9509ef6f84e5604bde51d32d7ac899c9e3d76af76c8cc38072e5061bd171d35dbf2faa618920c566590c7decd8efa7592a11b44eeb18b9695b0848f2dbf265238dbbc6050a9ccaa084de8bdd6457c031fa96d3a182c14222eb5a96cd18b1e0d05fad336ffbc68a15b7ccc6b565e410f5cea43704ab077c7a0e5aad49ac75805f35", &(0x7f0000000380)=""/67, &(0x7f0000000400)="b3af6b71b4712043c2b80b5a8e3289d518200a26cfeb6c8d39415095bc6238a9cda67432e8e473e52f74ad4cb771ab1945fe2112dc4f35d6cc8a0c04a008bb68fb38fd724e433fc306d3fb834326eb34147e0c83ffa1fb1c99d8786318c3e7e85a2174b66719c0da16e0f10da6d5dbeba89b91862c215b75be2dc575b0b633e0fc", &(0x7f00000004c0)="a5fea9954264b92fd996392b3daca760ad82ac6a9156c001fbff8782ed08cecc57c59c85f7a7d4ce9169a38502e9fb6e14843fbe447f4c5f36682dffff3b7a21d9166ef01bea90e542494f2a8d553fee47622c1dd706f29e635c87ede90894cb09", 0x7fff, r3}, 0x38) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="2c88ed069515001ff5b6e9c9e629e4000b7ee86dc15a654e3dc64e7c185bb157c3a3e7fd394229a738c33b04b6fcea31c4f2cf622d773c38e86c92e2b7157cc3739fe591003d5d1e", @ANYRES16=r2, @ANYBLOB="00002dbd7000000000000e000000080031000400000008003a00000000000500290000000000"], 0x2c}}, 0x20000004) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000007c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r7, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c0000784c0f11", @ANYRES16=r8, @ANYBLOB="010029bd7000ffdbdf25070000000800320001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4495a93375b4dbc8}, 0x8000) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100060}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="00022cbd7000fd9bdf2509000000007f00a200240000"], 0x1c}, 0x1, 0x0, 0x0, 0x40801}, 0x40000) 00:12:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x0, &(0x7f0000000480), &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 4: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:10 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:10 executing program 0: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0x10, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0xb}], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:10 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r5, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000540)={&(0x7f0000000280)="d7ea3ea8fa7e3468eafc7bce5fd412b2aabe74b3d101710852f79ac5f8938d9a8741e637d5cc4651237b8fc0e2d6d38c78a706a7e605da7f28dfe15dff21a3f0878c1b26b1d790c7e3754e2d2e05e6d12d4e9509ef6f84e5604bde51d32d7ac899c9e3d76af76c8cc38072e5061bd171d35dbf2faa618920c566590c7decd8efa7592a11b44eeb18b9695b0848f2dbf265238dbbc6050a9ccaa084de8bdd6457c031fa96d3a182c14222eb5a96cd18b1e0d05fad336ffbc68a15b7ccc6b565e410f5cea43704ab077c7a0e5aad49ac75805f35", &(0x7f0000000380)=""/67, &(0x7f0000000400)="b3af6b71b4712043c2b80b5a8e3289d518200a26cfeb6c8d39415095bc6238a9cda67432e8e473e52f74ad4cb771ab1945fe2112dc4f35d6cc8a0c04a008bb68fb38fd724e433fc306d3fb834326eb34147e0c83ffa1fb1c99d8786318c3e7e85a2174b66719c0da16e0f10da6d5dbeba89b91862c215b75be2dc575b0b633e0fc", &(0x7f00000004c0)="a5fea9954264b92fd996392b3daca760ad82ac6a9156c001fbff8782ed08cecc57c59c85f7a7d4ce9169a38502e9fb6e14843fbe447f4c5f36682dffff3b7a21d9166ef01bea90e542494f2a8d553fee47622c1dd706f29e635c87ede90894cb09", 0x7fff, r3}, 0x38) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="2c88ed069515001ff5b6e9c9e629e4000b7ee86dc15a654e3dc64e7c185bb157c3a3e7fd394229a738c33b04b6fcea31c4f2cf622d773c38e86c92e2b7157cc3739fe591003d5d1e", @ANYRES16=r2, @ANYBLOB="00002dbd7000000000000e000000080031000400000008003a00000000000500290000000000"], 0x2c}}, 0x20000004) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000007c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r7, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c0000784c0f11", @ANYRES16=r8, @ANYBLOB="010029bd7000ffdbdf25070000000800320001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4495a93375b4dbc8}, 0x8000) 00:12:10 executing program 4: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:10 executing program 0: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0x10, 0x12, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:10 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx], &(0x7f00000004c0)='syzkaller\x00', 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:10 executing program 4: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:10 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r5, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000540)={&(0x7f0000000280)="d7ea3ea8fa7e3468eafc7bce5fd412b2aabe74b3d101710852f79ac5f8938d9a8741e637d5cc4651237b8fc0e2d6d38c78a706a7e605da7f28dfe15dff21a3f0878c1b26b1d790c7e3754e2d2e05e6d12d4e9509ef6f84e5604bde51d32d7ac899c9e3d76af76c8cc38072e5061bd171d35dbf2faa618920c566590c7decd8efa7592a11b44eeb18b9695b0848f2dbf265238dbbc6050a9ccaa084de8bdd6457c031fa96d3a182c14222eb5a96cd18b1e0d05fad336ffbc68a15b7ccc6b565e410f5cea43704ab077c7a0e5aad49ac75805f35", &(0x7f0000000380)=""/67, &(0x7f0000000400)="b3af6b71b4712043c2b80b5a8e3289d518200a26cfeb6c8d39415095bc6238a9cda67432e8e473e52f74ad4cb771ab1945fe2112dc4f35d6cc8a0c04a008bb68fb38fd724e433fc306d3fb834326eb34147e0c83ffa1fb1c99d8786318c3e7e85a2174b66719c0da16e0f10da6d5dbeba89b91862c215b75be2dc575b0b633e0fc", &(0x7f00000004c0)="a5fea9954264b92fd996392b3daca760ad82ac6a9156c001fbff8782ed08cecc57c59c85f7a7d4ce9169a38502e9fb6e14843fbe447f4c5f36682dffff3b7a21d9166ef01bea90e542494f2a8d553fee47622c1dd706f29e635c87ede90894cb09", 0x7fff, r3}, 0x38) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="2c88ed069515001ff5b6e9c9e629e4000b7ee86dc15a654e3dc64e7c185bb157c3a3e7fd394229a738c33b04b6fcea31c4f2cf622d773c38e86c92e2b7157cc3739fe591003d5d1e", @ANYRES16=r2, @ANYBLOB="00002dbd7000000000000e000000080031000400000008003a00000000000500290000000000"], 0x2c}}, 0x20000004) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) syz_genetlink_get_family_id$batadv(&(0x7f00000007c0), 0xffffffffffffffff) 00:12:10 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:10 executing program 4: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx], 0x0, 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:10 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx], 0x0, 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r5, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000540)={&(0x7f0000000280)="d7ea3ea8fa7e3468eafc7bce5fd412b2aabe74b3d101710852f79ac5f8938d9a8741e637d5cc4651237b8fc0e2d6d38c78a706a7e605da7f28dfe15dff21a3f0878c1b26b1d790c7e3754e2d2e05e6d12d4e9509ef6f84e5604bde51d32d7ac899c9e3d76af76c8cc38072e5061bd171d35dbf2faa618920c566590c7decd8efa7592a11b44eeb18b9695b0848f2dbf265238dbbc6050a9ccaa084de8bdd6457c031fa96d3a182c14222eb5a96cd18b1e0d05fad336ffbc68a15b7ccc6b565e410f5cea43704ab077c7a0e5aad49ac75805f35", &(0x7f0000000380)=""/67, &(0x7f0000000400)="b3af6b71b4712043c2b80b5a8e3289d518200a26cfeb6c8d39415095bc6238a9cda67432e8e473e52f74ad4cb771ab1945fe2112dc4f35d6cc8a0c04a008bb68fb38fd724e433fc306d3fb834326eb34147e0c83ffa1fb1c99d8786318c3e7e85a2174b66719c0da16e0f10da6d5dbeba89b91862c215b75be2dc575b0b633e0fc", &(0x7f00000004c0)="a5fea9954264b92fd996392b3daca760ad82ac6a9156c001fbff8782ed08cecc57c59c85f7a7d4ce9169a38502e9fb6e14843fbe447f4c5f36682dffff3b7a21d9166ef01bea90e542494f2a8d553fee47622c1dd706f29e635c87ede90894cb09", 0x7fff, r3}, 0x38) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="2c88ed069515001ff5b6e9c9e629e4000b7ee86dc15a654e3dc64e7c185bb157c3a3e7fd394229a738c33b04b6fcea31c4f2cf622d773c38e86c92e2b7157cc3739fe591003d5d1e", @ANYRES16=r2, @ANYBLOB="00002dbd7000000000000e000000080031000400000008003a00000000000500290000000000"], 0x2c}}, 0x20000004) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r7) 00:12:10 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:10 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx], 0x0, 0xd2b, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:10 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x15, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:10 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r5, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000540)={&(0x7f0000000280)="d7ea3ea8fa7e3468eafc7bce5fd412b2aabe74b3d101710852f79ac5f8938d9a8741e637d5cc4651237b8fc0e2d6d38c78a706a7e605da7f28dfe15dff21a3f0878c1b26b1d790c7e3754e2d2e05e6d12d4e9509ef6f84e5604bde51d32d7ac899c9e3d76af76c8cc38072e5061bd171d35dbf2faa618920c566590c7decd8efa7592a11b44eeb18b9695b0848f2dbf265238dbbc6050a9ccaa084de8bdd6457c031fa96d3a182c14222eb5a96cd18b1e0d05fad336ffbc68a15b7ccc6b565e410f5cea43704ab077c7a0e5aad49ac75805f35", &(0x7f0000000380)=""/67, &(0x7f0000000400)="b3af6b71b4712043c2b80b5a8e3289d518200a26cfeb6c8d39415095bc6238a9cda67432e8e473e52f74ad4cb771ab1945fe2112dc4f35d6cc8a0c04a008bb68fb38fd724e433fc306d3fb834326eb34147e0c83ffa1fb1c99d8786318c3e7e85a2174b66719c0da16e0f10da6d5dbeba89b91862c215b75be2dc575b0b633e0fc", &(0x7f00000004c0)="a5fea9954264b92fd996392b3daca760ad82ac6a9156c001fbff8782ed08cecc57c59c85f7a7d4ce9169a38502e9fb6e14843fbe447f4c5f36682dffff3b7a21d9166ef01bea90e542494f2a8d553fee47622c1dd706f29e635c87ede90894cb09", 0x7fff, r3}, 0x38) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="2c88ed069515001ff5b6e9c9e629e4000b7ee86dc15a654e3dc64e7c185bb157c3a3e7fd394229a738c33b04b6fcea31c4f2cf622d773c38e86c92e2b7157cc3739fe591003d5d1e", @ANYRES16=r2, @ANYBLOB="00002dbd7000000000000e000000080031000400000008003a00000000000500290000000000"], 0x2c}}, 0x20000004) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) 00:12:10 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x81, &(0x7f0000000500)=""/129, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x80000001, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:10 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x15, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:10 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r4) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r5, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000540)={&(0x7f0000000280)="d7ea3ea8fa7e3468eafc7bce5fd412b2aabe74b3d101710852f79ac5f8938d9a8741e637d5cc4651237b8fc0e2d6d38c78a706a7e605da7f28dfe15dff21a3f0878c1b26b1d790c7e3754e2d2e05e6d12d4e9509ef6f84e5604bde51d32d7ac899c9e3d76af76c8cc38072e5061bd171d35dbf2faa618920c566590c7decd8efa7592a11b44eeb18b9695b0848f2dbf265238dbbc6050a9ccaa084de8bdd6457c031fa96d3a182c14222eb5a96cd18b1e0d05fad336ffbc68a15b7ccc6b565e410f5cea43704ab077c7a0e5aad49ac75805f35", &(0x7f0000000380)=""/67, &(0x7f0000000400)="b3af6b71b4712043c2b80b5a8e3289d518200a26cfeb6c8d39415095bc6238a9cda67432e8e473e52f74ad4cb771ab1945fe2112dc4f35d6cc8a0c04a008bb68fb38fd724e433fc306d3fb834326eb34147e0c83ffa1fb1c99d8786318c3e7e85a2174b66719c0da16e0f10da6d5dbeba89b91862c215b75be2dc575b0b633e0fc", &(0x7f00000004c0)="a5fea9954264b92fd996392b3daca760ad82ac6a9156c001fbff8782ed08cecc57c59c85f7a7d4ce9169a38502e9fb6e14843fbe447f4c5f36682dffff3b7a21d9166ef01bea90e542494f2a8d553fee47622c1dd706f29e635c87ede90894cb09", 0x7fff, r3}, 0x38) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="2c88ed069515001ff5b6e9c9e629e4000b7ee86dc15a654e3dc64e7c185bb157c3a3e7fd394229a738c33b04b6fcea31c4f2cf622d773c38e86c92e2b7157cc3739fe591003d5d1e", @ANYRES16=r2, @ANYBLOB="00002dbd7000000000000e000000080031000400000008003a00000000000500290000000000"], 0x2c}}, 0x20000004) 00:12:10 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:10 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:10 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x15, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:10 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r4, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000540)={&(0x7f0000000280)="d7ea3ea8fa7e3468eafc7bce5fd412b2aabe74b3d101710852f79ac5f8938d9a8741e637d5cc4651237b8fc0e2d6d38c78a706a7e605da7f28dfe15dff21a3f0878c1b26b1d790c7e3754e2d2e05e6d12d4e9509ef6f84e5604bde51d32d7ac899c9e3d76af76c8cc38072e5061bd171d35dbf2faa618920c566590c7decd8efa7592a11b44eeb18b9695b0848f2dbf265238dbbc6050a9ccaa084de8bdd6457c031fa96d3a182c14222eb5a96cd18b1e0d05fad336ffbc68a15b7ccc6b565e410f5cea43704ab077c7a0e5aad49ac75805f35", &(0x7f0000000380)=""/67, &(0x7f0000000400)="b3af6b71b4712043c2b80b5a8e3289d518200a26cfeb6c8d39415095bc6238a9cda67432e8e473e52f74ad4cb771ab1945fe2112dc4f35d6cc8a0c04a008bb68fb38fd724e433fc306d3fb834326eb34147e0c83ffa1fb1c99d8786318c3e7e85a2174b66719c0da16e0f10da6d5dbeba89b91862c215b75be2dc575b0b633e0fc", &(0x7f00000004c0)="a5fea9954264b92fd996392b3daca760ad82ac6a9156c001fbff8782ed08cecc57c59c85f7a7d4ce9169a38502e9fb6e14843fbe447f4c5f36682dffff3b7a21d9166ef01bea90e542494f2a8d553fee47622c1dd706f29e635c87ede90894cb09", 0x7fff, r2}, 0x38) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 00:12:10 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:10 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:10 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r4, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000540)={&(0x7f0000000280)="d7ea3ea8fa7e3468eafc7bce5fd412b2aabe74b3d101710852f79ac5f8938d9a8741e637d5cc4651237b8fc0e2d6d38c78a706a7e605da7f28dfe15dff21a3f0878c1b26b1d790c7e3754e2d2e05e6d12d4e9509ef6f84e5604bde51d32d7ac899c9e3d76af76c8cc38072e5061bd171d35dbf2faa618920c566590c7decd8efa7592a11b44eeb18b9695b0848f2dbf265238dbbc6050a9ccaa084de8bdd6457c031fa96d3a182c14222eb5a96cd18b1e0d05fad336ffbc68a15b7ccc6b565e410f5cea43704ab077c7a0e5aad49ac75805f35", &(0x7f0000000380)=""/67, &(0x7f0000000400)="b3af6b71b4712043c2b80b5a8e3289d518200a26cfeb6c8d39415095bc6238a9cda67432e8e473e52f74ad4cb771ab1945fe2112dc4f35d6cc8a0c04a008bb68fb38fd724e433fc306d3fb834326eb34147e0c83ffa1fb1c99d8786318c3e7e85a2174b66719c0da16e0f10da6d5dbeba89b91862c215b75be2dc575b0b633e0fc", &(0x7f00000004c0)="a5fea9954264b92fd996392b3daca760ad82ac6a9156c001fbff8782ed08cecc57c59c85f7a7d4ce9169a38502e9fb6e14843fbe447f4c5f36682dffff3b7a21d9166ef01bea90e542494f2a8d553fee47622c1dd706f29e635c87ede90894cb09", 0x7fff, r2}, 0x38) 00:12:10 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:10 executing program 5: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r4, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000540)={&(0x7f0000000280)="d7ea3ea8fa7e3468eafc7bce5fd412b2aabe74b3d101710852f79ac5f8938d9a8741e637d5cc4651237b8fc0e2d6d38c78a706a7e605da7f28dfe15dff21a3f0878c1b26b1d790c7e3754e2d2e05e6d12d4e9509ef6f84e5604bde51d32d7ac899c9e3d76af76c8cc38072e5061bd171d35dbf2faa618920c566590c7decd8efa7592a11b44eeb18b9695b0848f2dbf265238dbbc6050a9ccaa084de8bdd6457c031fa96d3a182c14222eb5a96cd18b1e0d05fad336ffbc68a15b7ccc6b565e410f5cea43704ab077c7a0e5aad49ac75805f35", &(0x7f0000000380)=""/67, &(0x7f0000000400)="b3af6b71b4712043c2b80b5a8e3289d518200a26cfeb6c8d39415095bc6238a9cda67432e8e473e52f74ad4cb771ab1945fe2112dc4f35d6cc8a0c04a008bb68fb38fd724e433fc306d3fb834326eb34147e0c83ffa1fb1c99d8786318c3e7e85a2174b66719c0da16e0f10da6d5dbeba89b91862c215b75be2dc575b0b633e0fc", &(0x7f00000004c0)="a5fea9954264b92fd996392b3daca760ad82ac6a9156c001fbff8782ed08cecc57c59c85f7a7d4ce9169a38502e9fb6e14843fbe447f4c5f36682dffff3b7a21d9166ef01bea90e542494f2a8d553fee47622c1dd706f29e635c87ede90894cb09", 0x7fff, r2}, 0x38) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 00:12:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:10 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r4, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) 00:12:10 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:10 executing program 5: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r4, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000540)={&(0x7f0000000280)="d7ea3ea8fa7e3468eafc7bce5fd412b2aabe74b3d101710852f79ac5f8938d9a8741e637d5cc4651237b8fc0e2d6d38c78a706a7e605da7f28dfe15dff21a3f0878c1b26b1d790c7e3754e2d2e05e6d12d4e9509ef6f84e5604bde51d32d7ac899c9e3d76af76c8cc38072e5061bd171d35dbf2faa618920c566590c7decd8efa7592a11b44eeb18b9695b0848f2dbf265238dbbc6050a9ccaa084de8bdd6457c031fa96d3a182c14222eb5a96cd18b1e0d05fad336ffbc68a15b7ccc6b565e410f5cea43704ab077c7a0e5aad49ac75805f35", &(0x7f0000000380)=""/67, &(0x7f0000000400)="b3af6b71b4712043c2b80b5a8e3289d518200a26cfeb6c8d39415095bc6238a9cda67432e8e473e52f74ad4cb771ab1945fe2112dc4f35d6cc8a0c04a008bb68fb38fd724e433fc306d3fb834326eb34147e0c83ffa1fb1c99d8786318c3e7e85a2174b66719c0da16e0f10da6d5dbeba89b91862c215b75be2dc575b0b633e0fc", &(0x7f00000004c0)="a5fea9954264b92fd996392b3daca760ad82ac6a9156c001fbff8782ed08cecc57c59c85f7a7d4ce9169a38502e9fb6e14843fbe447f4c5f36682dffff3b7a21d9166ef01bea90e542494f2a8d553fee47622c1dd706f29e635c87ede90894cb09", 0x7fff, r2}, 0x38) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 00:12:10 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x3, 0xd, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x5, 0xfffffffb}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:10 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c140000", @ANYRES16=r3, @ANYBLOB="000226bd7000fddbdf250600000005002a000100000005002e000000000008003b00000000000500290001000000050038000100000005002f000100000008000b0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40085}, 0xc90) 00:12:10 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0x10, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) 00:12:10 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff]}, 0x80) 00:12:11 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x33e6, 0x8040) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) r1 = syz_open_dev$midi(&(0x7f00000000c0), 0x5, 0x100) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000100)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000080)={0x0, 0x7, 0x7, 0x0, 0x6}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) 00:12:11 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0x10, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x2, &(0x7f0000000480)=@raw=[@map_idx], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 00:12:11 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = socket(0x26, 0x3, 0x3e) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) 00:12:11 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:11 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x33e6, 0x8040) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) r1 = syz_open_dev$midi(&(0x7f00000000c0), 0x5, 0x100) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000100)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000080)={0x0, 0x7, 0x7, 0x0, 0x6}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) 00:12:11 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socket(0x26, 0x3, 0x3e) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) 00:12:11 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0x10, 0x12, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:11 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x33e6, 0x8040) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) r1 = syz_open_dev$midi(&(0x7f00000000c0), 0x5, 0x100) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000100)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000080)={0x0, 0x7, 0x7, 0x0, 0x6}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) 00:12:11 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:11 executing program 0: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000000), 0x0, 0x800) syz_open_dev$admmidi(&(0x7f0000000140), 0x75, 0x101000) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) write$midi(r0, &(0x7f0000000040)="fec9964d904b746144d3bbc4895ff8b5b672f9bb6911824a31e7c17b75dd22411263061bc87b15f9e8f6a5de0d530208d0746cd06d37f1cfd4470ae218aac137b4570d07f83772a16a102fdd75934a027684f00e13c73d2084bd787102a120cb15c9771f4ef55acfab12827a0cf4f457d26cec1afa4a0bbf9c465334a26bc9b15832313ecdc9e2e1930e1c8c974dc34d41f155418da156a71c4b48c3f258d1fa45a4834af5869e02e905d66c2b5242ae9920611f5c9f72d5f45660dc9001c09bbe88d6337eadb46e2b95c56b2216", 0xce) 00:12:11 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x33e6, 0x8040) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) r1 = syz_open_dev$midi(&(0x7f00000000c0), 0x5, 0x100) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000100)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000080)={0x0, 0x7, 0x7, 0x0, 0x6}) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) 00:12:11 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) 00:12:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 1) 00:12:11 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) [ 731.255977][T22126] FAULT_INJECTION: forcing a failure. [ 731.255977][T22126] name fail_usercopy, interval 1, probability 0, space 0, times 0 00:12:11 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socket(0x26, 0x3, 0x3e) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) 00:12:11 executing program 0: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000000), 0x0, 0x800) syz_open_dev$admmidi(&(0x7f0000000140), 0x75, 0x101000) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) write$midi(r0, &(0x7f0000000040)="fec9964d904b746144d3bbc4895ff8b5b672f9bb6911824a31e7c17b75dd22411263061bc87b15f9e8f6a5de0d530208d0746cd06d37f1cfd4470ae218aac137b4570d07f83772a16a102fdd75934a027684f00e13c73d2084bd787102a120cb15c9771f4ef55acfab12827a0cf4f457d26cec1afa4a0bbf9c465334a26bc9b15832313ecdc9e2e1930e1c8c974dc34d41f155418da156a71c4b48c3f258d1fa45a4834af5869e02e905d66c2b5242ae9920611f5c9f72d5f45660dc9001c09bbe88d6337eadb46e2b95c56b2216", 0xce) [ 731.284792][T22126] CPU: 1 PID: 22126 Comm: syz-executor.1 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 731.286862][T22126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 731.289007][T22126] Call trace: [ 731.289660][T22126] dump_backtrace+0x1b8/0x1e4 [ 731.290703][T22126] show_stack+0x2c/0x44 [ 731.291575][T22126] dump_stack_lvl+0xd0/0x124 [ 731.292556][T22126] dump_stack+0x1c/0x28 [ 731.293405][T22126] should_fail_ex+0x3f8/0x5c4 [ 731.294357][T22126] should_fail+0x14/0x24 [ 731.295248][T22126] should_fail_usercopy+0x20/0x30 [ 731.296364][T22126] copy_from_bpfptr+0x78/0x1f0 [ 731.297428][T22126] __sys_bpf+0x1fc/0x65c [ 731.298352][T22126] __arm64_sys_bpf+0x80/0x98 [ 731.299248][T22126] invoke_syscall+0x98/0x2c0 [ 731.300146][T22126] el0_svc_common+0x138/0x244 [ 731.301167][T22126] do_el0_svc+0x64/0x198 [ 731.302085][T22126] el0_svc+0x4c/0x160 [ 731.302991][T22126] el0t_64_sync_handler+0x84/0xfc [ 731.304050][T22126] el0t_64_sync+0x190/0x194 00:12:11 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) 00:12:11 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x33e6, 0x8040) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) r1 = syz_open_dev$midi(&(0x7f00000000c0), 0x5, 0x100) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000100)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000080)={0x0, 0x7, 0x7, 0x0, 0x6}) 00:12:11 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 1) 00:12:11 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) [ 731.371635][T22140] FAULT_INJECTION: forcing a failure. [ 731.371635][T22140] name fail_usercopy, interval 1, probability 0, space 0, times 0 00:12:11 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socket(0x26, 0x3, 0x3e) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) 00:12:11 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x33e6, 0x8040) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) r1 = syz_open_dev$midi(&(0x7f00000000c0), 0x5, 0x100) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000100)) 00:12:11 executing program 0: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000000), 0x0, 0x800) syz_open_dev$admmidi(&(0x7f0000000140), 0x75, 0x101000) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) write$midi(r0, &(0x7f0000000040)="fec9964d904b746144d3bbc4895ff8b5b672f9bb6911824a31e7c17b75dd22411263061bc87b15f9e8f6a5de0d530208d0746cd06d37f1cfd4470ae218aac137b4570d07f83772a16a102fdd75934a027684f00e13c73d2084bd787102a120cb15c9771f4ef55acfab12827a0cf4f457d26cec1afa4a0bbf9c465334a26bc9b15832313ecdc9e2e1930e1c8c974dc34d41f155418da156a71c4b48c3f258d1fa45a4834af5869e02e905d66c2b5242ae9920611f5c9f72d5f45660dc9001c09bbe88d6337eadb46e2b95c56b2216", 0xce) 00:12:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 2) [ 731.412616][T22140] CPU: 1 PID: 22140 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 731.414583][T22140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 731.416652][T22140] Call trace: [ 731.417317][T22140] dump_backtrace+0x1b8/0x1e4 [ 731.418304][T22140] show_stack+0x2c/0x44 [ 731.419230][T22140] dump_stack_lvl+0xd0/0x124 [ 731.420203][T22140] dump_stack+0x1c/0x28 [ 731.421085][T22140] should_fail_ex+0x3f8/0x5c4 [ 731.422083][T22140] should_fail+0x14/0x24 [ 731.422956][T22140] should_fail_usercopy+0x20/0x30 [ 731.424063][T22140] copy_msghdr_from_user+0xb8/0x59c [ 731.425195][T22140] __sys_sendmsg+0x200/0x33c [ 731.426191][T22140] __arm64_sys_sendmsg+0x80/0x94 [ 731.427182][T22140] invoke_syscall+0x98/0x2c0 [ 731.428160][T22140] el0_svc_common+0x138/0x244 [ 731.429192][T22140] do_el0_svc+0x64/0x198 [ 731.430085][T22140] el0_svc+0x4c/0x160 [ 731.430942][T22140] el0t_64_sync_handler+0x84/0xfc [ 731.431955][T22140] el0t_64_sync+0x190/0x194 00:12:11 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) (fail_nth: 1) 00:12:11 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x33e6, 0x8040) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) syz_open_dev$midi(&(0x7f00000000c0), 0x5, 0x100) 00:12:11 executing program 0: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000000), 0x0, 0x800) syz_open_dev$admmidi(&(0x7f0000000140), 0x75, 0x101000) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) [ 731.458307][T22150] FAULT_INJECTION: forcing a failure. [ 731.458307][T22150] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 731.465670][T22150] CPU: 1 PID: 22150 Comm: syz-executor.1 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 731.467743][T22150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 731.469824][T22150] Call trace: [ 731.470455][T22150] dump_backtrace+0x1b8/0x1e4 [ 731.471463][T22150] show_stack+0x2c/0x44 [ 731.472355][T22150] dump_stack_lvl+0xd0/0x124 [ 731.473381][T22150] dump_stack+0x1c/0x28 [ 731.474209][T22150] should_fail_ex+0x3f8/0x5c4 [ 731.475220][T22150] should_fail+0x14/0x24 [ 731.476069][T22150] should_fail_usercopy+0x20/0x30 [ 731.477082][T22150] strncpy_from_user+0x48/0x54c [ 731.478121][T22150] bpf_prog_load+0x170/0x1714 [ 731.479072][T22150] __sys_bpf+0x32c/0x65c [ 731.480007][T22150] __arm64_sys_bpf+0x80/0x98 [ 731.481014][T22150] invoke_syscall+0x98/0x2c0 [ 731.482028][T22150] el0_svc_common+0x138/0x244 [ 731.482994][T22150] do_el0_svc+0x64/0x198 [ 731.483855][T22150] el0_svc+0x4c/0x160 [ 731.484670][T22150] el0t_64_sync_handler+0x84/0xfc [ 731.485678][T22150] el0t_64_sync+0x190/0x194 [ 731.486232][T22153] FAULT_INJECTION: forcing a failure. [ 731.486232][T22153] name fail_usercopy, interval 1, probability 0, space 0, times 0 00:12:11 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socket(0x26, 0x3, 0x3e) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) [ 731.493365][T22153] CPU: 0 PID: 22153 Comm: syz-executor.2 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 731.495599][T22153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 731.497724][T22153] Call trace: [ 731.498430][T22153] dump_backtrace+0x1b8/0x1e4 [ 731.499455][T22153] show_stack+0x2c/0x44 [ 731.500351][T22153] dump_stack_lvl+0xd0/0x124 [ 731.501273][T22153] dump_stack+0x1c/0x28 [ 731.502157][T22153] should_fail_ex+0x3f8/0x5c4 [ 731.503186][T22153] should_fail+0x14/0x24 [ 731.504123][T22153] should_fail_usercopy+0x20/0x30 [ 731.505210][T22153] copy_from_bpfptr+0x78/0x1f0 [ 731.506190][T22153] __sys_bpf+0x1fc/0x65c [ 731.507058][T22153] __arm64_sys_bpf+0x80/0x98 [ 731.508048][T22153] invoke_syscall+0x98/0x2c0 [ 731.508962][T22153] el0_svc_common+0x138/0x244 [ 731.509923][T22153] do_el0_svc+0x64/0x198 [ 731.510825][T22153] el0_svc+0x4c/0x160 [ 731.511669][T22153] el0t_64_sync_handler+0x84/0xfc [ 731.512703][T22153] el0t_64_sync+0x190/0x194 00:12:11 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x33e6, 0x8040) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) 00:12:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 3) 00:12:11 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 2) 00:12:11 executing program 0: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000000), 0x0, 0x800) syz_open_dev$admmidi(&(0x7f0000000140), 0x75, 0x101000) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) 00:12:11 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socket(0x26, 0x3, 0x3e) [ 731.598927][T22162] FAULT_INJECTION: forcing a failure. [ 731.598927][T22162] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 731.601923][T22162] CPU: 1 PID: 22162 Comm: syz-executor.1 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 731.604012][T22162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 731.606136][T22162] Call trace: [ 731.606849][T22162] dump_backtrace+0x1b8/0x1e4 [ 731.607792][T22162] show_stack+0x2c/0x44 [ 731.608615][T22162] dump_stack_lvl+0xd0/0x124 [ 731.609499][T22162] dump_stack+0x1c/0x28 [ 731.610387][T22162] should_fail_ex+0x3f8/0x5c4 [ 731.611398][T22162] should_fail+0x14/0x24 [ 731.612323][T22162] should_fail_usercopy+0x20/0x30 [ 731.613396][T22162] simple_read_from_buffer+0xd4/0x248 [ 731.614472][T22162] proc_fail_nth_read+0x198/0x234 [ 731.615571][T22162] vfs_read+0x284/0x8ac [ 731.616450][T22162] ksys_read+0x15c/0x26c [ 731.617343][T22162] __arm64_sys_read+0x7c/0x90 [ 731.617965][T22165] FAULT_INJECTION: forcing a failure. [ 731.617965][T22165] name failslab, interval 1, probability 0, space 0, times 0 [ 731.618361][T22162] invoke_syscall+0x98/0x2c0 [ 731.622226][T22162] el0_svc_common+0x138/0x244 [ 731.623250][T22162] do_el0_svc+0x64/0x198 [ 731.624133][T22162] el0_svc+0x4c/0x160 [ 731.625027][T22162] el0t_64_sync_handler+0x84/0xfc [ 731.626056][T22162] el0t_64_sync+0x190/0x194 00:12:11 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) (fail_nth: 2) 00:12:11 executing program 5: read$midi(0xffffffffffffffff, &(0x7f0000000040)=""/9, 0x9) 00:12:11 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket(0x26, 0x3, 0x3e) [ 731.654008][T22165] CPU: 0 PID: 22165 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 731.656140][T22165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 731.658244][T22165] Call trace: [ 731.658924][T22165] dump_backtrace+0x1b8/0x1e4 [ 731.659872][T22165] show_stack+0x2c/0x44 [ 731.660768][T22165] dump_stack_lvl+0xd0/0x124 [ 731.661751][T22165] dump_stack+0x1c/0x28 [ 731.662680][T22165] should_fail_ex+0x3f8/0x5c4 [ 731.663803][T22165] __should_failslab+0xc8/0x128 [ 731.664910][T22165] should_failslab+0x10/0x28 [ 731.665897][T22165] kmem_cache_alloc_node+0x84/0x46c [ 731.666970][T22165] __alloc_skb+0x19c/0x3d8 [ 731.667912][T22165] netlink_sendmsg+0x634/0xb18 [ 731.668934][T22165] ____sys_sendmsg+0x568/0x81c [ 731.669986][T22165] __sys_sendmsg+0x26c/0x33c [ 731.670925][T22165] __arm64_sys_sendmsg+0x80/0x94 [ 731.671886][T22165] invoke_syscall+0x98/0x2c0 [ 731.672851][T22165] el0_svc_common+0x138/0x244 [ 731.673914][T22165] do_el0_svc+0x64/0x198 [ 731.674786][T22165] el0_svc+0x4c/0x160 [ 731.675585][T22165] el0t_64_sync_handler+0x84/0xfc [ 731.676719][T22165] el0t_64_sync+0x190/0x194 00:12:11 executing program 0: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000000), 0x0, 0x800) syz_open_dev$admmidi(&(0x7f0000000140), 0x75, 0x101000) 00:12:11 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) socket(0x26, 0x3, 0x3e) 00:12:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:11 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) (fail_nth: 3) 00:12:11 executing program 0: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000000), 0x0, 0x800) 00:12:11 executing program 5: read$midi(0xffffffffffffffff, &(0x7f0000000040)=""/9, 0x9) 00:12:11 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 3) 00:12:11 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) socket(0x26, 0x3, 0x3e) 00:12:11 executing program 1: bpf$PROG_LOAD(0x2, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:11 executing program 5: read$midi(0xffffffffffffffff, &(0x7f0000000040)=""/9, 0x9) 00:12:11 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) (fail_nth: 4) 00:12:11 executing program 0: syz_open_dev$midi(&(0x7f0000000000), 0x0, 0x800) 00:12:11 executing program 3: fsmount(0xffffffffffffffff, 0x1, 0x2) socket(0x26, 0x3, 0x3e) 00:12:11 executing program 1: bpf$PROG_LOAD(0x3, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:11 executing program 5: r0 = syz_open_dev$admmidi(0x0, 0x33e6, 0x8040) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) 00:12:11 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 4) 00:12:11 executing program 0: syz_open_dev$midi(0x0, 0x0, 0x800) [ 731.903420][T22202] FAULT_INJECTION: forcing a failure. [ 731.903420][T22202] name fail_usercopy, interval 1, probability 0, space 0, times 0 00:12:11 executing program 1: bpf$PROG_LOAD(0x4, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:11 executing program 3: socket(0x26, 0x3, 0x3e) [ 731.934772][T22206] FAULT_INJECTION: forcing a failure. [ 731.934772][T22206] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 731.942318][T22202] CPU: 0 PID: 22202 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 731.944390][T22202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 731.946491][T22202] Call trace: [ 731.947217][T22202] dump_backtrace+0x1b8/0x1e4 [ 731.948194][T22202] show_stack+0x2c/0x44 [ 731.949048][T22202] dump_stack_lvl+0xd0/0x124 [ 731.950024][T22202] dump_stack+0x1c/0x28 [ 731.950904][T22202] should_fail_ex+0x3f8/0x5c4 [ 731.951938][T22202] should_fail+0x14/0x24 [ 731.952837][T22202] should_fail_usercopy+0x20/0x30 [ 731.953900][T22202] _copy_from_iter+0x1b0/0xe7c [ 731.954887][T22202] netlink_sendmsg+0x704/0xb18 [ 731.955870][T22202] ____sys_sendmsg+0x568/0x81c [ 731.956888][T22202] __sys_sendmsg+0x26c/0x33c [ 731.957840][T22202] __arm64_sys_sendmsg+0x80/0x94 [ 731.958930][T22202] invoke_syscall+0x98/0x2c0 [ 731.959931][T22202] el0_svc_common+0x138/0x244 [ 731.960925][T22202] do_el0_svc+0x64/0x198 [ 731.961781][T22202] el0_svc+0x4c/0x160 [ 731.962639][T22202] el0t_64_sync_handler+0x84/0xfc [ 731.963672][T22202] el0t_64_sync+0x190/0x194 [ 731.964635][T22206] CPU: 1 PID: 22206 Comm: syz-executor.2 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 731.966725][T22206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 731.968793][T22206] Call trace: [ 731.969448][T22206] dump_backtrace+0x1b8/0x1e4 [ 731.970499][T22206] show_stack+0x2c/0x44 [ 731.971351][T22206] dump_stack_lvl+0xd0/0x124 [ 731.972305][T22206] dump_stack+0x1c/0x28 [ 731.973103][T22206] should_fail_ex+0x3f8/0x5c4 [ 731.974220][T22206] should_fail+0x14/0x24 [ 731.975146][T22206] should_fail_usercopy+0x20/0x30 [ 731.976199][T22206] btf_new_fd+0x278/0x890 [ 731.977093][T22206] bpf_btf_load+0x80/0xa0 [ 731.978048][T22206] __sys_bpf+0x458/0x65c [ 731.978972][T22206] __arm64_sys_bpf+0x80/0x98 [ 731.979943][T22206] invoke_syscall+0x98/0x2c0 [ 731.980847][T22206] el0_svc_common+0x138/0x244 [ 731.981852][T22206] do_el0_svc+0x64/0x198 [ 731.982759][T22206] el0_svc+0x4c/0x160 [ 731.983584][T22206] el0t_64_sync_handler+0x84/0xfc [ 731.984585][T22206] el0t_64_sync+0x190/0x194 00:12:11 executing program 5: r0 = syz_open_dev$admmidi(0x0, 0x33e6, 0x8040) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) 00:12:11 executing program 0: syz_open_dev$midi(0x0, 0x0, 0x800) 00:12:11 executing program 3: socket(0x0, 0x3, 0x3e) 00:12:12 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) (fail_nth: 5) 00:12:12 executing program 1: bpf$PROG_LOAD(0x6, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 0: syz_open_dev$midi(0x0, 0x0, 0x800) 00:12:12 executing program 5: r0 = syz_open_dev$admmidi(0x0, 0x33e6, 0x8040) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) 00:12:12 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 5) 00:12:12 executing program 3: socket(0x0, 0x3, 0x3e) [ 732.142628][T22228] FAULT_INJECTION: forcing a failure. [ 732.142628][T22228] name failslab, interval 1, probability 0, space 0, times 0 00:12:12 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x0, 0x8040) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) 00:12:12 executing program 1: bpf$PROG_LOAD(0x7, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 0: syz_open_dev$midi(&(0x7f0000000000), 0x0, 0x0) [ 732.158616][T22228] CPU: 1 PID: 22228 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 732.160642][T22228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 732.162817][T22228] Call trace: [ 732.163469][T22228] dump_backtrace+0x1b8/0x1e4 [ 732.164427][T22228] show_stack+0x2c/0x44 [ 732.165276][T22228] dump_stack_lvl+0xd0/0x124 [ 732.166176][T22228] dump_stack+0x1c/0x28 [ 732.167046][T22228] should_fail_ex+0x3f8/0x5c4 [ 732.167970][T22228] __should_failslab+0xc8/0x128 [ 732.169012][T22228] should_failslab+0x10/0x28 [ 732.169966][T22228] __kmem_cache_alloc_node+0x80/0x388 [ 732.171080][T22228] kmalloc_trace+0x3c/0x88 [ 732.172025][T22228] __request_module+0x2cc/0x678 [ 732.173023][T22228] crypto_alg_mod_lookup+0xa0/0x628 [ 732.174081][T22228] crypto_add_alg+0x184/0x2b0 [ 732.175091][T22228] crypto_user_rcv_msg+0x410/0x53c [ 732.176138][T22228] netlink_rcv_skb+0x214/0x3c4 [ 732.177191][T22228] crypto_netlink_rcv+0x3c/0x54 [ 732.178151][T22228] netlink_unicast+0x660/0x8d4 [ 732.179096][T22228] netlink_sendmsg+0x834/0xb18 [ 732.180066][T22228] ____sys_sendmsg+0x568/0x81c [ 732.181134][T22228] __sys_sendmsg+0x26c/0x33c [ 732.182011][T22228] __arm64_sys_sendmsg+0x80/0x94 [ 732.183028][T22228] invoke_syscall+0x98/0x2c0 [ 732.184007][T22228] el0_svc_common+0x138/0x244 [ 732.184971][T22228] do_el0_svc+0x64/0x198 [ 732.185825][T22228] el0_svc+0x4c/0x160 [ 732.186758][T22228] el0t_64_sync_handler+0x84/0xfc [ 732.187774][T22228] el0t_64_sync+0x190/0x194 [ 732.200066][T22235] FAULT_INJECTION: forcing a failure. [ 732.200066][T22235] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 732.208569][T22235] CPU: 1 PID: 22235 Comm: syz-executor.2 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 732.210653][T22235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 732.212869][T22235] Call trace: [ 732.213569][T22235] dump_backtrace+0x1b8/0x1e4 [ 732.214491][T22235] show_stack+0x2c/0x44 [ 732.215362][T22235] dump_stack_lvl+0xd0/0x124 [ 732.216298][T22235] dump_stack+0x1c/0x28 [ 732.217149][T22235] should_fail_ex+0x3f8/0x5c4 [ 732.218049][T22235] should_fail+0x14/0x24 [ 732.218930][T22235] should_fail_usercopy+0x20/0x30 [ 732.219961][T22235] simple_read_from_buffer+0xd4/0x248 [ 732.221046][T22235] proc_fail_nth_read+0x198/0x234 [ 732.222090][T22235] vfs_read+0x284/0x8ac [ 732.222947][T22235] ksys_read+0x15c/0x26c [ 732.223823][T22235] __arm64_sys_read+0x7c/0x90 [ 732.224772][T22235] invoke_syscall+0x98/0x2c0 [ 732.225703][T22235] el0_svc_common+0x138/0x244 [ 732.226634][T22235] do_el0_svc+0x64/0x198 [ 732.227469][T22235] el0_svc+0x4c/0x160 [ 732.228273][T22235] el0t_64_sync_handler+0x84/0xfc [ 732.229220][T22235] el0t_64_sync+0x190/0x194 00:12:12 executing program 0: bpf$PROG_LOAD(0x6, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 1: bpf$PROG_LOAD(0x8, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x0, 0x0) read$midi(r0, &(0x7f0000000040)=""/9, 0x9) 00:12:12 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) 00:12:12 executing program 3: socket(0x0, 0x3, 0x3e) 00:12:12 executing program 5: syz_open_dev$admmidi(&(0x7f0000000000), 0x0, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000000040)=""/9, 0x9) 00:12:12 executing program 1: bpf$PROG_LOAD(0x9, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 6) 00:12:12 executing program 0: bpf$PROG_LOAD(0x6, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 3: socket(0x26, 0x0, 0x3e) 00:12:12 executing program 2: bpf$MAP_DELETE_BATCH(0x2, 0x0, 0x0) 00:12:12 executing program 5: syz_open_dev$admmidi(&(0x7f0000000000), 0x0, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000000040)=""/9, 0x9) 00:12:12 executing program 1: bpf$PROG_LOAD(0xa, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 1: bpf$PROG_LOAD(0xb, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 5: syz_open_dev$admmidi(&(0x7f0000000000), 0x0, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000000040)=""/9, 0x9) 00:12:12 executing program 2: bpf$MAP_DELETE_BATCH(0x3, 0x0, 0x0) 00:12:12 executing program 3: socket(0x26, 0x0, 0x0) 00:12:12 executing program 0: bpf$PROG_LOAD(0x6, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 732.510129][T22271] FAULT_INJECTION: forcing a failure. [ 732.510129][T22271] name failslab, interval 1, probability 0, space 0, times 0 [ 732.516791][T22271] CPU: 0 PID: 22271 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 732.518734][T22271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 732.520761][T22271] Call trace: [ 732.521401][T22271] dump_backtrace+0x1b8/0x1e4 [ 732.522368][T22271] show_stack+0x2c/0x44 [ 732.523218][T22271] dump_stack_lvl+0xd0/0x124 [ 732.524133][T22271] dump_stack+0x1c/0x28 [ 732.524936][T22271] should_fail_ex+0x3f8/0x5c4 [ 732.525902][T22271] __should_failslab+0xc8/0x128 [ 732.526981][T22271] should_failslab+0x10/0x28 [ 732.527863][T22271] __kmem_cache_alloc_node+0x80/0x388 [ 732.528916][T22271] __kmalloc_node_track_caller+0xbc/0x1c0 [ 732.530188][T22271] kstrdup+0x50/0x98 [ 732.531014][T22271] __request_module+0x2e0/0x678 [ 732.532009][T22271] crypto_alg_mod_lookup+0xa0/0x628 [ 732.533131][T22271] crypto_add_alg+0x184/0x2b0 [ 732.534131][T22271] crypto_user_rcv_msg+0x410/0x53c [ 732.535150][T22271] netlink_rcv_skb+0x214/0x3c4 [ 732.536118][T22271] crypto_netlink_rcv+0x3c/0x54 [ 732.537174][T22271] netlink_unicast+0x660/0x8d4 [ 732.538192][T22271] netlink_sendmsg+0x834/0xb18 [ 732.539163][T22271] ____sys_sendmsg+0x568/0x81c [ 732.540142][T22271] __sys_sendmsg+0x26c/0x33c [ 732.541105][T22271] __arm64_sys_sendmsg+0x80/0x94 [ 732.542161][T22271] invoke_syscall+0x98/0x2c0 [ 732.543113][T22271] el0_svc_common+0x138/0x244 00:12:12 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000), 0x0, 0x0) read$midi(r0, 0x0, 0x0) [ 732.544030][T22271] do_el0_svc+0x64/0x198 [ 732.544935][T22271] el0_svc+0x4c/0x160 [ 732.545764][T22271] el0t_64_sync_handler+0x84/0xfc [ 732.546818][T22271] el0t_64_sync+0x190/0x194 00:12:12 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 7) 00:12:12 executing program 3: bpf$PROG_LOAD(0xa, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 0: bpf$PROG_LOAD(0x6, 0x0, 0x0) 00:12:12 executing program 1: bpf$PROG_LOAD(0xc, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 2: bpf$MAP_DELETE_BATCH(0x4, 0x0, 0x0) 00:12:12 executing program 5: bpf$PROG_LOAD(0xb, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 5: bpf$PROG_LOAD(0xb, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 2: bpf$MAP_DELETE_BATCH(0x5, 0x0, 0x0) 00:12:12 executing program 1: bpf$PROG_LOAD(0xd, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 3: bpf$PROG_LOAD(0xa, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 732.713584][T22293] FAULT_INJECTION: forcing a failure. [ 732.713584][T22293] name failslab, interval 1, probability 0, space 0, times 0 00:12:12 executing program 0: bpf$PROG_LOAD(0x6, 0x0, 0x0) [ 732.742536][T22293] CPU: 1 PID: 22293 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 732.744624][T22293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 732.746665][T22293] Call trace: [ 732.747375][T22293] dump_backtrace+0x1b8/0x1e4 [ 732.748313][T22293] show_stack+0x2c/0x44 [ 732.749152][T22293] dump_stack_lvl+0xd0/0x124 [ 732.750194][T22293] dump_stack+0x1c/0x28 [ 732.751155][T22293] should_fail_ex+0x3f8/0x5c4 [ 732.752260][T22293] __should_failslab+0xc8/0x128 [ 732.753253][T22293] should_failslab+0x10/0x28 [ 732.754248][T22293] __kmem_cache_alloc_node+0x80/0x388 [ 732.755489][T22293] kmalloc_trace+0x3c/0x88 [ 732.756401][T22293] call_usermodehelper_setup+0xa8/0x254 [ 732.757630][T22293] __request_module+0x3a4/0x678 [ 732.758666][T22293] crypto_alg_mod_lookup+0xa0/0x628 [ 732.759687][T22293] crypto_add_alg+0x184/0x2b0 [ 732.760609][T22293] crypto_user_rcv_msg+0x410/0x53c [ 732.761759][T22293] netlink_rcv_skb+0x214/0x3c4 [ 732.762702][T22293] crypto_netlink_rcv+0x3c/0x54 [ 732.763629][T22293] netlink_unicast+0x660/0x8d4 [ 732.764536][T22293] netlink_sendmsg+0x834/0xb18 [ 732.765475][T22293] ____sys_sendmsg+0x568/0x81c [ 732.766429][T22293] __sys_sendmsg+0x26c/0x33c [ 732.767347][T22293] __arm64_sys_sendmsg+0x80/0x94 00:12:12 executing program 1: bpf$PROG_LOAD(0xe, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 732.768282][T22293] invoke_syscall+0x98/0x2c0 [ 732.769238][T22293] el0_svc_common+0x138/0x244 [ 732.770201][T22293] do_el0_svc+0x64/0x198 [ 732.771078][T22293] el0_svc+0x4c/0x160 [ 732.771892][T22293] el0t_64_sync_handler+0x84/0xfc [ 732.772897][T22293] el0t_64_sync+0x190/0x194 00:12:12 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 8) 00:12:12 executing program 0: bpf$PROG_LOAD(0x6, 0x0, 0x0) 00:12:12 executing program 2: bpf$MAP_DELETE_BATCH(0x6, 0x0, 0x0) 00:12:12 executing program 5: bpf$PROG_LOAD(0xb, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 1: bpf$PROG_LOAD(0xf, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 3: bpf$PROG_LOAD(0xa, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 0: bpf$PROG_LOAD(0x6, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 5: bpf$PROG_LOAD(0xb, 0x0, 0x0) 00:12:12 executing program 1: bpf$PROG_LOAD(0x10, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:12 executing program 3: bpf$PROG_LOAD(0xa, 0x0, 0x0) 00:12:12 executing program 2: bpf$MAP_DELETE_BATCH(0x7, 0x0, 0x0) 00:12:12 executing program 2: bpf$MAP_DELETE_BATCH(0x8, 0x0, 0x0) [ 733.043401][T22321] FAULT_INJECTION: forcing a failure. [ 733.043401][T22321] name failslab, interval 1, probability 0, space 0, times 0 [ 733.046216][T22321] CPU: 1 PID: 22321 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 733.048188][T22321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 733.050257][T22321] Call trace: [ 733.050932][T22321] dump_backtrace+0x1b8/0x1e4 [ 733.051913][T22321] show_stack+0x2c/0x44 [ 733.052818][T22321] dump_stack_lvl+0xd0/0x124 [ 733.053836][T22321] dump_stack+0x1c/0x28 [ 733.054672][T22321] should_fail_ex+0x3f8/0x5c4 [ 733.055655][T22321] __should_failslab+0xc8/0x128 [ 733.056714][T22321] should_failslab+0x10/0x28 [ 733.057689][T22321] __kmem_cache_alloc_node+0x80/0x388 [ 733.058818][T22321] kmalloc_trace+0x3c/0x88 [ 733.059730][T22321] __request_module+0x2cc/0x678 [ 733.060697][T22321] crypto_alg_mod_lookup+0xdc/0x628 [ 733.061792][T22321] crypto_add_alg+0x184/0x2b0 [ 733.062814][T22321] crypto_user_rcv_msg+0x410/0x53c [ 733.063993][T22321] netlink_rcv_skb+0x214/0x3c4 [ 733.065005][T22321] crypto_netlink_rcv+0x3c/0x54 [ 733.066079][T22321] netlink_unicast+0x660/0x8d4 [ 733.067093][T22321] netlink_sendmsg+0x834/0xb18 [ 733.068090][T22321] ____sys_sendmsg+0x568/0x81c [ 733.069022][T22321] __sys_sendmsg+0x26c/0x33c [ 733.070001][T22321] __arm64_sys_sendmsg+0x80/0x94 [ 733.071031][T22321] invoke_syscall+0x98/0x2c0 [ 733.071963][T22321] el0_svc_common+0x138/0x244 [ 733.072907][T22321] do_el0_svc+0x64/0x198 [ 733.073853][T22321] el0_svc+0x4c/0x160 [ 733.074693][T22321] el0t_64_sync_handler+0x84/0xfc [ 733.075774][T22321] el0t_64_sync+0x190/0x194 00:12:13 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 9) 00:12:13 executing program 3: bpf$PROG_LOAD(0xa, 0x0, 0x0) 00:12:13 executing program 5: bpf$PROG_LOAD(0xb, 0x0, 0x0) 00:12:13 executing program 0: bpf$PROG_LOAD(0x6, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 1: bpf$PROG_LOAD(0x11, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 2: bpf$MAP_DELETE_BATCH(0x9, 0x0, 0x0) 00:12:13 executing program 5: bpf$PROG_LOAD(0xb, 0x0, 0x0) 00:12:13 executing program 2: bpf$MAP_DELETE_BATCH(0xa, 0x0, 0x0) 00:12:13 executing program 3: bpf$PROG_LOAD(0xa, 0x0, 0x0) 00:12:13 executing program 0: bpf$PROG_LOAD(0x6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 1: bpf$PROG_LOAD(0x12, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 5: bpf$PROG_LOAD(0xb, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 733.276460][T22346] FAULT_INJECTION: forcing a failure. [ 733.276460][T22346] name failslab, interval 1, probability 0, space 0, times 0 [ 733.283619][T22346] CPU: 1 PID: 22346 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 733.285685][T22346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 733.287885][T22346] Call trace: [ 733.288537][T22346] dump_backtrace+0x1b8/0x1e4 [ 733.289536][T22346] show_stack+0x2c/0x44 [ 733.290440][T22346] dump_stack_lvl+0xd0/0x124 [ 733.291540][T22346] dump_stack+0x1c/0x28 [ 733.292409][T22346] should_fail_ex+0x3f8/0x5c4 [ 733.293344][T22346] __should_failslab+0xc8/0x128 [ 733.294333][T22346] should_failslab+0x10/0x28 [ 733.295270][T22346] __kmem_cache_alloc_node+0x80/0x388 [ 733.296348][T22346] __kmalloc_node_track_caller+0xbc/0x1c0 [ 733.297570][T22346] kstrdup+0x50/0x98 [ 733.298397][T22346] __request_module+0x2e0/0x678 [ 733.299438][T22346] crypto_alg_mod_lookup+0xdc/0x628 [ 733.300493][T22346] crypto_add_alg+0x184/0x2b0 [ 733.301474][T22346] crypto_user_rcv_msg+0x410/0x53c [ 733.302565][T22346] netlink_rcv_skb+0x214/0x3c4 [ 733.303589][T22346] crypto_netlink_rcv+0x3c/0x54 [ 733.304534][T22346] netlink_unicast+0x660/0x8d4 [ 733.305523][T22346] netlink_sendmsg+0x834/0xb18 [ 733.306448][T22346] ____sys_sendmsg+0x568/0x81c [ 733.307408][T22346] __sys_sendmsg+0x26c/0x33c [ 733.308345][T22346] __arm64_sys_sendmsg+0x80/0x94 [ 733.309407][T22346] invoke_syscall+0x98/0x2c0 [ 733.310328][T22346] el0_svc_common+0x138/0x244 [ 733.311293][T22346] do_el0_svc+0x64/0x198 [ 733.312193][T22346] el0_svc+0x4c/0x160 [ 733.313053][T22346] el0t_64_sync_handler+0x84/0xfc [ 733.314092][T22346] el0t_64_sync+0x190/0x194 00:12:13 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 10) 00:12:13 executing program 3: bpf$PROG_LOAD(0xa, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 2: bpf$MAP_DELETE_BATCH(0xb, 0x0, 0x0) 00:12:13 executing program 1: bpf$PROG_LOAD(0x13, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 0: bpf$PROG_LOAD(0x12, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 5: bpf$PROG_LOAD(0xb, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 5: bpf$PROG_LOAD(0xb, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 3: bpf$PROG_LOAD(0xa, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 2: bpf$MAP_DELETE_BATCH(0xc, 0x0, 0x0) 00:12:13 executing program 1: bpf$PROG_LOAD(0x14, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 0: bpf$PROG_LOAD(0x12, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 0: bpf$PROG_LOAD(0x12, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 733.504322][T22371] FAULT_INJECTION: forcing a failure. [ 733.504322][T22371] name failslab, interval 1, probability 0, space 0, times 0 [ 733.520929][T22371] CPU: 1 PID: 22371 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 733.523002][T22371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 733.525025][T22371] Call trace: [ 733.525700][T22371] dump_backtrace+0x1b8/0x1e4 [ 733.526651][T22371] show_stack+0x2c/0x44 [ 733.527494][T22371] dump_stack_lvl+0xd0/0x124 [ 733.528542][T22371] dump_stack+0x1c/0x28 [ 733.529469][T22371] should_fail_ex+0x3f8/0x5c4 [ 733.530497][T22371] __should_failslab+0xc8/0x128 [ 733.531531][T22371] should_failslab+0x10/0x28 [ 733.532449][T22371] __kmem_cache_alloc_node+0x80/0x388 [ 733.533557][T22371] kmalloc_trace+0x3c/0x88 [ 733.534469][T22371] call_usermodehelper_setup+0xa8/0x254 [ 733.535579][T22371] __request_module+0x3a4/0x678 [ 733.536631][T22371] crypto_alg_mod_lookup+0xdc/0x628 [ 733.537693][T22371] crypto_add_alg+0x184/0x2b0 [ 733.538683][T22371] crypto_user_rcv_msg+0x410/0x53c [ 733.539724][T22371] netlink_rcv_skb+0x214/0x3c4 [ 733.540724][T22371] crypto_netlink_rcv+0x3c/0x54 [ 733.541695][T22371] netlink_unicast+0x660/0x8d4 [ 733.542646][T22371] netlink_sendmsg+0x834/0xb18 [ 733.543604][T22371] ____sys_sendmsg+0x568/0x81c [ 733.544639][T22371] __sys_sendmsg+0x26c/0x33c [ 733.545517][T22371] __arm64_sys_sendmsg+0x80/0x94 [ 733.546591][T22371] invoke_syscall+0x98/0x2c0 [ 733.547525][T22371] el0_svc_common+0x138/0x244 [ 733.548518][T22371] do_el0_svc+0x64/0x198 [ 733.549354][T22371] el0_svc+0x4c/0x160 [ 733.550203][T22371] el0t_64_sync_handler+0x84/0xfc [ 733.551160][T22371] el0t_64_sync+0x190/0x194 00:12:13 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 11) 00:12:13 executing program 2: bpf$MAP_DELETE_BATCH(0xd, 0x0, 0x0) 00:12:13 executing program 1: bpf$PROG_LOAD(0x15, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 3: bpf$PROG_LOAD(0xa, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 5: bpf$PROG_LOAD(0x14, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 0: bpf$PROG_LOAD(0x12, 0x0, 0x0) 00:12:13 executing program 1: bpf$PROG_LOAD(0x16, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 2: bpf$MAP_DELETE_BATCH(0xe, 0x0, 0x0) 00:12:13 executing program 5: bpf$PROG_LOAD(0x14, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 0: bpf$PROG_LOAD(0x12, 0x0, 0x0) 00:12:13 executing program 3: bpf$PROG_LOAD(0x15, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 1: bpf$PROG_LOAD(0x17, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 733.811714][T22402] FAULT_INJECTION: forcing a failure. [ 733.811714][T22402] name failslab, interval 1, probability 0, space 0, times 0 [ 733.814489][T22402] CPU: 0 PID: 22402 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 733.816522][T22402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 733.818617][T22402] Call trace: [ 733.819297][T22402] dump_backtrace+0x1b8/0x1e4 [ 733.820259][T22402] show_stack+0x2c/0x44 [ 733.821139][T22402] dump_stack_lvl+0xd0/0x124 [ 733.822077][T22402] dump_stack+0x1c/0x28 [ 733.822951][T22402] should_fail_ex+0x3f8/0x5c4 [ 733.823891][T22402] __should_failslab+0xc8/0x128 [ 733.825025][T22402] should_failslab+0x10/0x28 [ 733.825992][T22402] __kmem_cache_alloc_node+0x80/0x388 [ 733.827122][T22402] kmalloc_trace+0x3c/0x88 [ 733.828011][T22402] crypto_alg_mod_lookup+0x168/0x628 [ 733.829070][T22402] crypto_add_alg+0x184/0x2b0 [ 733.830019][T22402] crypto_user_rcv_msg+0x410/0x53c [ 733.831093][T22402] netlink_rcv_skb+0x214/0x3c4 [ 733.832095][T22402] crypto_netlink_rcv+0x3c/0x54 [ 733.833127][T22402] netlink_unicast+0x660/0x8d4 [ 733.834252][T22402] netlink_sendmsg+0x834/0xb18 [ 733.835297][T22402] ____sys_sendmsg+0x568/0x81c [ 733.836350][T22402] __sys_sendmsg+0x26c/0x33c [ 733.837306][T22402] __arm64_sys_sendmsg+0x80/0x94 [ 733.838333][T22402] invoke_syscall+0x98/0x2c0 [ 733.839338][T22402] el0_svc_common+0x138/0x244 [ 733.840360][T22402] do_el0_svc+0x64/0x198 [ 733.841303][T22402] el0_svc+0x4c/0x160 [ 733.842149][T22402] el0t_64_sync_handler+0x84/0xfc [ 733.843192][T22402] el0t_64_sync+0x190/0x194 00:12:13 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 12) 00:12:13 executing program 5: bpf$PROG_LOAD(0x14, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 2: bpf$MAP_DELETE_BATCH(0xf, 0x0, 0x0) 00:12:13 executing program 3: bpf$PROG_LOAD(0x15, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 0: bpf$PROG_LOAD(0x12, 0x0, 0x0) 00:12:13 executing program 1: bpf$PROG_LOAD(0x18, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 0: bpf$PROG_LOAD(0x12, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 1: bpf$PROG_LOAD(0x19, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 5: bpf$PROG_LOAD(0x14, 0x0, 0x0) 00:12:13 executing program 3: bpf$PROG_LOAD(0x15, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:13 executing program 2: bpf$MAP_DELETE_BATCH(0x10, 0x0, 0x0) 00:12:13 executing program 5: bpf$PROG_LOAD(0x14, 0x0, 0x0) [ 734.058294][T22423] FAULT_INJECTION: forcing a failure. [ 734.058294][T22423] name failslab, interval 1, probability 0, space 0, times 0 [ 734.061153][T22423] CPU: 1 PID: 22423 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 734.063296][T22423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 734.065577][T22423] Call trace: [ 734.066223][T22423] dump_backtrace+0x1b8/0x1e4 [ 734.067196][T22423] show_stack+0x2c/0x44 [ 734.068100][T22423] dump_stack_lvl+0xd0/0x124 [ 734.069041][T22423] dump_stack+0x1c/0x28 [ 734.069835][T22423] should_fail_ex+0x3f8/0x5c4 [ 734.070793][T22423] __should_failslab+0xc8/0x128 [ 734.071819][T22423] should_failslab+0x10/0x28 [ 734.072884][T22423] __kmem_cache_alloc_node+0x80/0x388 [ 734.074079][T22423] kmalloc_trace+0x3c/0x88 [ 734.075039][T22423] cryptomgr_notify+0x94/0x9c8 [ 734.076003][T22423] notifier_call_chain+0x1a4/0x510 [ 734.077055][T22423] blocking_notifier_call_chain+0x70/0xa0 [ 734.078266][T22423] crypto_alg_mod_lookup+0x290/0x628 [ 734.079321][T22423] crypto_add_alg+0x184/0x2b0 [ 734.080293][T22423] crypto_user_rcv_msg+0x410/0x53c [ 734.081460][T22423] netlink_rcv_skb+0x214/0x3c4 [ 734.082476][T22423] crypto_netlink_rcv+0x3c/0x54 [ 734.083485][T22423] netlink_unicast+0x660/0x8d4 [ 734.084466][T22423] netlink_sendmsg+0x834/0xb18 [ 734.085445][T22423] ____sys_sendmsg+0x568/0x81c [ 734.086463][T22423] __sys_sendmsg+0x26c/0x33c [ 734.087435][T22423] __arm64_sys_sendmsg+0x80/0x94 [ 734.088416][T22423] invoke_syscall+0x98/0x2c0 [ 734.089304][T22423] el0_svc_common+0x138/0x244 [ 734.090270][T22423] do_el0_svc+0x64/0x198 [ 734.091141][T22423] el0_svc+0x4c/0x160 [ 734.091949][T22423] el0t_64_sync_handler+0x84/0xfc [ 734.092975][T22423] el0t_64_sync+0x190/0x194 00:12:14 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 13) 00:12:14 executing program 0: bpf$PROG_LOAD(0x12, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 1: bpf$PROG_LOAD(0x1a, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 2: bpf$MAP_DELETE_BATCH(0x11, 0x0, 0x0) 00:12:14 executing program 3: bpf$PROG_LOAD(0x15, 0x0, 0x0) 00:12:14 executing program 5: bpf$PROG_LOAD(0x14, 0x0, 0x0) 00:12:14 executing program 2: bpf$MAP_DELETE_BATCH(0x13, 0x0, 0x0) 00:12:14 executing program 0: bpf$PROG_LOAD(0x12, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 5: bpf$PROG_LOAD(0x14, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 1: bpf$PROG_LOAD(0x1b, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 3: bpf$PROG_LOAD(0x15, 0x0, 0x0) 00:12:14 executing program 2: bpf$MAP_DELETE_BATCH(0x14, 0x0, 0x0) [ 734.308095][T22450] FAULT_INJECTION: forcing a failure. [ 734.308095][T22450] name failslab, interval 1, probability 0, space 0, times 0 [ 734.311239][T22450] CPU: 0 PID: 22450 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 734.313192][T22450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 734.315189][T22450] Call trace: [ 734.315878][T22450] dump_backtrace+0x1b8/0x1e4 [ 734.316907][T22450] show_stack+0x2c/0x44 [ 734.317753][T22450] dump_stack_lvl+0xd0/0x124 [ 734.318696][T22450] dump_stack+0x1c/0x28 [ 734.319563][T22450] should_fail_ex+0x3f8/0x5c4 [ 734.320590][T22450] __should_failslab+0xc8/0x128 [ 734.321629][T22450] should_failslab+0x10/0x28 [ 734.322559][T22450] __kmem_cache_alloc_node+0x80/0x388 [ 734.323714][T22450] kmalloc_trace+0x3c/0x88 [ 734.324630][T22450] __request_module+0x2cc/0x678 [ 734.325724][T22450] crypto_alg_mod_lookup+0x360/0x628 [ 734.326826][T22450] crypto_add_alg+0x184/0x2b0 [ 734.327818][T22450] crypto_user_rcv_msg+0x410/0x53c [ 734.328871][T22450] netlink_rcv_skb+0x214/0x3c4 [ 734.329860][T22450] crypto_netlink_rcv+0x3c/0x54 [ 734.330869][T22450] netlink_unicast+0x660/0x8d4 [ 734.331861][T22450] netlink_sendmsg+0x834/0xb18 [ 734.332882][T22450] ____sys_sendmsg+0x568/0x81c [ 734.333869][T22450] __sys_sendmsg+0x26c/0x33c [ 734.334833][T22450] __arm64_sys_sendmsg+0x80/0x94 [ 734.335863][T22450] invoke_syscall+0x98/0x2c0 [ 734.336823][T22450] el0_svc_common+0x138/0x244 [ 734.337736][T22450] do_el0_svc+0x64/0x198 [ 734.338631][T22450] el0_svc+0x4c/0x160 [ 734.339439][T22450] el0t_64_sync_handler+0x84/0xfc [ 734.340531][T22450] el0t_64_sync+0x190/0x194 00:12:14 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 14) 00:12:14 executing program 3: bpf$PROG_LOAD(0x15, 0x0, 0x0) 00:12:14 executing program 0: bpf$PROG_LOAD(0x18, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 1: bpf$PROG_LOAD(0x1c, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 2: bpf$MAP_DELETE_BATCH(0x15, 0x0, 0x0) 00:12:14 executing program 5: bpf$PROG_LOAD(0x14, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 2: bpf$MAP_DELETE_BATCH(0x16, 0x0, 0x0) 00:12:14 executing program 3: bpf$PROG_LOAD(0x15, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 0: bpf$PROG_LOAD(0x18, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 5: bpf$PROG_LOAD(0x14, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 1: bpf$PROG_LOAD(0x1d, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 5: bpf$PROG_LOAD(0x1c, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 734.562218][T22476] FAULT_INJECTION: forcing a failure. [ 734.562218][T22476] name failslab, interval 1, probability 0, space 0, times 0 [ 734.565086][T22476] CPU: 1 PID: 22476 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 734.567028][T22476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 734.569092][T22476] Call trace: [ 734.569773][T22476] dump_backtrace+0x1b8/0x1e4 [ 734.570769][T22476] show_stack+0x2c/0x44 [ 734.571637][T22476] dump_stack_lvl+0xd0/0x124 [ 734.572659][T22476] dump_stack+0x1c/0x28 [ 734.573540][T22476] should_fail_ex+0x3f8/0x5c4 [ 734.574517][T22476] __should_failslab+0xc8/0x128 [ 734.575562][T22476] should_failslab+0x10/0x28 [ 734.576552][T22476] __kmem_cache_alloc_node+0x80/0x388 [ 734.577682][T22476] __kmalloc_node_track_caller+0xbc/0x1c0 [ 734.578962][T22476] kstrdup+0x50/0x98 [ 734.579743][T22476] __request_module+0x2e0/0x678 [ 734.580743][T22476] crypto_alg_mod_lookup+0x360/0x628 [ 734.581843][T22476] crypto_add_alg+0x184/0x2b0 [ 734.582842][T22476] crypto_user_rcv_msg+0x410/0x53c [ 734.583947][T22476] netlink_rcv_skb+0x214/0x3c4 [ 734.584967][T22476] crypto_netlink_rcv+0x3c/0x54 [ 734.585946][T22476] netlink_unicast+0x660/0x8d4 [ 734.586950][T22476] netlink_sendmsg+0x834/0xb18 [ 734.587945][T22476] ____sys_sendmsg+0x568/0x81c [ 734.588912][T22476] __sys_sendmsg+0x26c/0x33c [ 734.589845][T22476] __arm64_sys_sendmsg+0x80/0x94 [ 734.590818][T22476] invoke_syscall+0x98/0x2c0 [ 734.591744][T22476] el0_svc_common+0x138/0x244 [ 734.592754][T22476] do_el0_svc+0x64/0x198 [ 734.593704][T22476] el0_svc+0x4c/0x160 [ 734.594519][T22476] el0t_64_sync_handler+0x84/0xfc [ 734.595625][T22476] el0t_64_sync+0x190/0x194 00:12:14 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 15) 00:12:14 executing program 3: bpf$PROG_LOAD(0x15, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 2: bpf$MAP_DELETE_BATCH(0x17, 0x0, 0x0) 00:12:14 executing program 0: bpf$PROG_LOAD(0x18, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 1: bpf$PROG_LOAD(0x1e, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 5: bpf$PROG_LOAD(0x1c, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 1: bpf$PROG_LOAD(0x21, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 5: bpf$PROG_LOAD(0x1c, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 3: bpf$PROG_LOAD(0x15, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 2: bpf$MAP_DELETE_BATCH(0x18, 0x0, 0x0) 00:12:14 executing program 0: bpf$PROG_LOAD(0x18, 0x0, 0x0) 00:12:14 executing program 2: bpf$MAP_DELETE_BATCH(0x19, 0x0, 0x0) [ 734.763700][T22502] FAULT_INJECTION: forcing a failure. [ 734.763700][T22502] name failslab, interval 1, probability 0, space 0, times 0 [ 734.766412][T22502] CPU: 1 PID: 22502 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 734.768495][T22502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 734.770746][T22502] Call trace: [ 734.771455][T22502] dump_backtrace+0x1b8/0x1e4 [ 734.772399][T22502] show_stack+0x2c/0x44 [ 734.773187][T22502] dump_stack_lvl+0xd0/0x124 [ 734.774172][T22502] dump_stack+0x1c/0x28 [ 734.775013][T22502] should_fail_ex+0x3f8/0x5c4 [ 734.776022][T22502] __should_failslab+0xc8/0x128 [ 734.777067][T22502] should_failslab+0x10/0x28 [ 734.778029][T22502] __kmem_cache_alloc_node+0x80/0x388 [ 734.779196][T22502] kmalloc_trace+0x3c/0x88 [ 734.780122][T22502] call_usermodehelper_setup+0xa8/0x254 [ 734.781328][T22502] __request_module+0x3a4/0x678 [ 734.782357][T22502] crypto_alg_mod_lookup+0x360/0x628 [ 734.783448][T22502] crypto_add_alg+0x184/0x2b0 [ 734.784436][T22502] crypto_user_rcv_msg+0x410/0x53c [ 734.785546][T22502] netlink_rcv_skb+0x214/0x3c4 [ 734.786553][T22502] crypto_netlink_rcv+0x3c/0x54 [ 734.787591][T22502] netlink_unicast+0x660/0x8d4 [ 734.788569][T22502] netlink_sendmsg+0x834/0xb18 [ 734.789567][T22502] ____sys_sendmsg+0x568/0x81c [ 734.790547][T22502] __sys_sendmsg+0x26c/0x33c [ 734.791527][T22502] __arm64_sys_sendmsg+0x80/0x94 [ 734.792584][T22502] invoke_syscall+0x98/0x2c0 [ 734.793558][T22502] el0_svc_common+0x138/0x244 [ 734.794473][T22502] do_el0_svc+0x64/0x198 [ 734.795460][T22502] el0_svc+0x4c/0x160 [ 734.796322][T22502] el0t_64_sync_handler+0x84/0xfc [ 734.797368][T22502] el0t_64_sync+0x190/0x194 00:12:14 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 16) 00:12:14 executing program 1: bpf$PROG_LOAD(0x22, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 5: bpf$PROG_LOAD(0x1c, 0x0, 0x0) 00:12:14 executing program 3: bpf$PROG_LOAD(0x21, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 0: bpf$PROG_LOAD(0x18, 0x0, 0x0) 00:12:14 executing program 2: bpf$MAP_DELETE_BATCH(0x1a, 0x0, 0x0) 00:12:14 executing program 0: bpf$PROG_LOAD(0x18, 0x0, 0x0) 00:12:14 executing program 5: bpf$PROG_LOAD(0x1c, 0x0, 0x0) 00:12:14 executing program 3: bpf$PROG_LOAD(0x21, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 2: bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) 00:12:14 executing program 1: bpf$PROG_LOAD(0x23, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:14 executing program 5: bpf$PROG_LOAD(0x1c, 0x0, 0x0) [ 735.030348][T22528] FAULT_INJECTION: forcing a failure. [ 735.030348][T22528] name failslab, interval 1, probability 0, space 0, times 0 [ 735.032923][T22528] CPU: 1 PID: 22528 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 735.034961][T22528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 735.037159][T22528] Call trace: [ 735.037852][T22528] dump_backtrace+0x1b8/0x1e4 [ 735.038886][T22528] show_stack+0x2c/0x44 [ 735.039820][T22528] dump_stack_lvl+0xd0/0x124 [ 735.040768][T22528] dump_stack+0x1c/0x28 [ 735.041591][T22528] should_fail_ex+0x3f8/0x5c4 [ 735.042619][T22528] __should_failslab+0xc8/0x128 [ 735.043647][T22528] should_failslab+0x10/0x28 [ 735.044574][T22528] __kmem_cache_alloc_node+0x80/0x388 [ 735.045759][T22528] kmalloc_trace+0x3c/0x88 [ 735.046681][T22528] cryptomgr_notify+0x94/0x9c8 [ 735.047701][T22528] notifier_call_chain+0x1a4/0x510 [ 735.048861][T22528] blocking_notifier_call_chain+0x70/0xa0 [ 735.050026][T22528] crypto_alg_mod_lookup+0x374/0x628 [ 735.051077][T22528] crypto_add_alg+0x184/0x2b0 [ 735.052070][T22528] crypto_user_rcv_msg+0x410/0x53c [ 735.053146][T22528] netlink_rcv_skb+0x214/0x3c4 [ 735.054168][T22528] crypto_netlink_rcv+0x3c/0x54 [ 735.055208][T22528] netlink_unicast+0x660/0x8d4 [ 735.056215][T22528] netlink_sendmsg+0x834/0xb18 [ 735.057168][T22528] ____sys_sendmsg+0x568/0x81c [ 735.058180][T22528] __sys_sendmsg+0x26c/0x33c [ 735.059090][T22528] __arm64_sys_sendmsg+0x80/0x94 [ 735.060260][T22528] invoke_syscall+0x98/0x2c0 [ 735.061209][T22528] el0_svc_common+0x138/0x244 [ 735.062138][T22528] do_el0_svc+0x64/0x198 [ 735.063123][T22528] el0_svc+0x4c/0x160 [ 735.064065][T22528] el0t_64_sync_handler+0x84/0xfc [ 735.065088][T22528] el0t_64_sync+0x190/0x194 00:12:15 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 17) 00:12:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 0: bpf$PROG_LOAD(0x18, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 5: bpf$PROG_LOAD(0x1c, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 2: bpf$MAP_DELETE_BATCH(0x1c, 0x0, 0x0) 00:12:15 executing program 3: bpf$PROG_LOAD(0x21, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x3, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 3: bpf$PROG_LOAD(0x21, 0x0, 0x0) 00:12:15 executing program 0: bpf$PROG_LOAD(0x18, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 5: bpf$PROG_LOAD(0x1c, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 2: bpf$MAP_DELETE_BATCH(0x1d, 0x0, 0x0) 00:12:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x4, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 735.299232][T22562] FAULT_INJECTION: forcing a failure. [ 735.299232][T22562] name failslab, interval 1, probability 0, space 0, times 0 [ 735.302131][T22562] CPU: 1 PID: 22562 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 735.304245][T22562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 735.306338][T22562] Call trace: [ 735.307027][T22562] dump_backtrace+0x1b8/0x1e4 [ 735.307957][T22562] show_stack+0x2c/0x44 [ 735.308837][T22562] dump_stack_lvl+0xd0/0x124 [ 735.309759][T22562] dump_stack+0x1c/0x28 [ 735.310583][T22562] should_fail_ex+0x3f8/0x5c4 [ 735.311537][T22562] __should_failslab+0xc8/0x128 [ 735.312562][T22562] should_failslab+0x10/0x28 [ 735.313606][T22562] kmem_cache_alloc_node+0x84/0x46c [ 735.314686][T22562] __alloc_skb+0x19c/0x3d8 [ 735.315580][T22562] netlink_ack+0x2e4/0xf50 [ 735.316553][T22562] netlink_rcv_skb+0x1f4/0x3c4 [ 735.317571][T22562] crypto_netlink_rcv+0x3c/0x54 [ 735.318567][T22562] netlink_unicast+0x660/0x8d4 [ 735.319536][T22562] netlink_sendmsg+0x834/0xb18 [ 735.320513][T22562] ____sys_sendmsg+0x568/0x81c [ 735.321511][T22562] __sys_sendmsg+0x26c/0x33c [ 735.322470][T22562] __arm64_sys_sendmsg+0x80/0x94 [ 735.323468][T22562] invoke_syscall+0x98/0x2c0 [ 735.324362][T22562] el0_svc_common+0x138/0x244 [ 735.325325][T22562] do_el0_svc+0x64/0x198 [ 735.326239][T22562] el0_svc+0x4c/0x160 [ 735.327138][T22562] el0t_64_sync_handler+0x84/0xfc [ 735.328247][T22562] el0t_64_sync+0x190/0x194 00:12:15 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 18) 00:12:15 executing program 3: bpf$PROG_LOAD(0x21, 0x0, 0x0) 00:12:15 executing program 5: bpf$PROG_LOAD(0x1c, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 0: bpf$PROG_LOAD(0x18, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 2: bpf$MAP_DELETE_BATCH(0x1e, 0x0, 0x0) 00:12:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 2: bpf$MAP_DELETE_BATCH(0x21, 0x0, 0x0) 00:12:15 executing program 3: bpf$PROG_LOAD(0x21, 0x0, 0x0) 00:12:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 2: bpf$MAP_DELETE_BATCH(0x22, 0x0, 0x0) 00:12:15 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) (fail_nth: 19) 00:12:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x7, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 3: bpf$PROG_LOAD(0x21, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 2: bpf$MAP_DELETE_BATCH(0x23, 0x0, 0x0) 00:12:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x8, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x8) 00:12:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 3: bpf$PROG_LOAD(0x21, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 735.752586][T22609] FAULT_INJECTION: forcing a failure. [ 735.752586][T22609] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 735.755463][T22609] CPU: 1 PID: 22609 Comm: syz-executor.4 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 735.757578][T22609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 735.759788][T22609] Call trace: [ 735.760517][T22609] dump_backtrace+0x1b8/0x1e4 [ 735.761474][T22609] show_stack+0x2c/0x44 [ 735.762358][T22609] dump_stack_lvl+0xd0/0x124 [ 735.763299][T22609] dump_stack+0x1c/0x28 [ 735.764227][T22609] should_fail_ex+0x3f8/0x5c4 [ 735.765196][T22609] should_fail+0x14/0x24 [ 735.766132][T22609] should_fail_usercopy+0x20/0x30 [ 735.767173][T22609] simple_read_from_buffer+0xd4/0x248 [ 735.768294][T22609] proc_fail_nth_read+0x198/0x234 [ 735.769363][T22609] vfs_read+0x284/0x8ac [ 735.770249][T22609] ksys_read+0x15c/0x26c [ 735.771060][T22609] __arm64_sys_read+0x7c/0x90 [ 735.772008][T22609] invoke_syscall+0x98/0x2c0 [ 735.772992][T22609] el0_svc_common+0x138/0x244 [ 735.774017][T22609] do_el0_svc+0x64/0x198 [ 735.774915][T22609] el0_svc+0x4c/0x160 [ 735.775733][T22609] el0t_64_sync_handler+0x84/0xfc [ 735.776799][T22609] el0t_64_sync+0x190/0x194 00:12:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:15 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x10) 00:12:15 executing program 3: bpf$PROG_LOAD(0x21, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xb, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:15 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:15 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x90) 00:12:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xc, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x110) 00:12:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:15 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:16 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xd, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x1001) 00:12:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xf, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x1f00) 00:12:16 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x2, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x10, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:16 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x9000) 00:12:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:16 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x100000) 00:12:16 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x1000000) 00:12:16 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x12, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x1100000) 00:12:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x13, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x8000000) 00:12:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x4, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:16 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x10000000) 00:12:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x16, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x1f000000) 00:12:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x17, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x40000000) 00:12:16 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x18, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x90000000) 00:12:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xffffff7f) 00:12:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x6, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1a, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x4000000000) 00:12:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x1000000000000) 00:12:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x10000000000000) 00:12:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x110000000000000) 00:12:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:17 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x800000000000000) 00:12:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:17 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x8, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0xf4240, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x1000000000000000) 00:12:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x1f00000000000000) 00:12:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 00:12:17 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x9, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:17 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x9000000000000000) 00:12:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x732}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4094}, 0x0) shutdown(0xffffffffffffffff, 0x1) 00:12:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:17 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xffff0c9a0080ffff) 00:12:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x732}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4094}, 0x0) (async) shutdown(0xffffffffffffffff, 0x1) 00:12:18 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:18 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xffff80009a0cffff) 00:12:18 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0xa, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:18 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x732}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4094}, 0x0) (async) shutdown(0xffffffffffffffff, 0x1) 00:12:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:18 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xffffff7f00000000) 00:12:18 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:18 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:12:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:18 executing program 5: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:18 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f0000000000)={@any, 0x9}) 00:12:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) r1 = syz_usb_connect(0x3, 0xc09, &(0x7f0000000b40)={{0x12, 0x1, 0x110, 0x6d, 0x9b, 0xc0, 0x10, 0x187f, 0x302, 0x817, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xbf7, 0x3, 0x5, 0xe1, 0x90, 0x5, [{{0x9, 0x4, 0x0, 0x5, 0xd, 0xb6, 0x6b, 0x54, 0x13, [@generic={0xe2, 0x23, "7a135dc100e8e7cc0545b933efe6186650fa4d6ff8ff9fc6d10c134a23bfbb74887d4aa605f5c5d4830b8e73d1077874aa7f91199d1556a5ed06dcde8c52af76321c341be3d7f1191b9ae487d9bedc3c24ee98fff2cbcfdc58240ece44e8b1460632e4385af1ec2e0fde5bae7172a44c018cf0ea7e1b37814f0b6fd97021b0c20f4e0cd845f7a1a64a146e7c35e6bf2ea0b26297cedeabe910d0fce966ac5ad60179ef7591dc8a65ab0f543e997d4eab639c302a73287b25af116698ffe04f1badac7fbf39321b595db550da19b44380cc29ccabe8229201c7341b8fee337e4d"}], [{{0x9, 0x5, 0x3, 0x0, 0x20, 0xff, 0x92, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xad, 0x1}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x0, 0x9}]}}, {{0x9, 0x5, 0x6, 0x1, 0x200, 0x9, 0x0, 0x9, [@generic={0x8b, 0xa, "9d57533c1ba63b12a5ff9df5b4b9750ed4eef8ce0d29cb07bdafc6a6fedb6d77d5e1e88fa00238f71708e72c3ae09b23573789cb02e3586b68def0ca1cb058469af9216d4af47f8d1e751312387dd73ac2b604640f37c7a97ab70efdcebd398796a8da1f73a489b754e83716d744d13150c8a14c0f7ec50644ac0c4705d6d3df4b66262168cd15cee4"}]}}, {{0x9, 0x5, 0xc, 0x0, 0x3ff, 0x0, 0x3, 0xc, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x5, 0x3}]}}, {{0x9, 0x5, 0x2, 0x4, 0x28, 0x0, 0x40, 0x40, [@generic={0x2d, 0x31, "4b019e17c14610a75bba08075ba34f680fa01804b12180ea718c3d6ca26ca189829eff3cbb86c68858f8ae"}, @generic={0xb3, 0xb, "8c7b81e6fbeba6e961044b82ca11b41e3ed227e77801e489384134008c874cb5e1e3374b3cce73b8feaa6fe2188c1140e3ee90a1e608079eb6ab1569ace1d4a8fb2cde9b9535081b7e6c753079a2d2046e98274f410ac0e9520f1fcdd2df89a3adee4fea425b814de64f097f7765b2481b9ae6a5ad330f60039736d04df527a5b36143d7c1b8c747d8078a2435e2abaaa47f2cfa88bace765beec113e192b7014f8e0c24ba9e9f647a5c399d92757b1e72"}]}}, {{0x9, 0x5, 0xb, 0x10, 0x8, 0x4, 0x0, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x9}]}}, {{0x9, 0x5, 0x2, 0x10, 0x20, 0x20, 0x0, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x5, 0x3}]}}, {{0x9, 0x5, 0x7, 0x4, 0x200, 0x4, 0x8, 0x9, [@generic={0xe0, 0x10, "07f49d639f75d400d6abe0771d265ca87ba6d6995670761d98bb81a56c47828afe3e4f344aa778938ceb36678b36b0cf53bf5e4696853b7def97dacf969eec79c580987120676338746f3a5fe04b04042573709aca6e6993e7bb7c9042781e19c282e9515d4a505c1b86dab3c7578d9eff062562eb7020c5c0cd47720881fce52bf447db4ec6d4485c4b03deb6350d2f65c95fea9fbc12a8934aa434596dcaae56712fb690a17d68e71d2ac377fab9f7717ea5dbbc0a0dbf48c859b30f658323c572f507e020973f10c070b4aa0ba9cb1e0dce42e014c5e5cdcac2004cc7"}]}}, {{0x9, 0x5, 0xb, 0x8, 0x10, 0x3f, 0x7, 0x81, [@generic={0xdd, 0x24, "9bfde775d18e5240467003251666c37b63ecf76d83b51941878dcae90135f728bd954117607e9d0703707efca1c8d16536ac4b8b02ccce1f36f4128365b037f7a98365f8f37c9907bde723b02d5db3113a58296f01ef1f85a30bc11facff51510c2f007784115330ad0ae44a22885aa93892680b3aae2aa5a886a7e1314bed5610a447f26eab10d7c7ea6e344501c5daec8882d6354bf482d32bac5cb2e3c60d36ab58845a819ad5c9693b197553d69e293f4b6ff3c4d5de3ea409b2bb46008aca955aa97239a502f74684e1a196ef75132780bbaeec91f60ff9b0"}]}}, {{0x9, 0x5, 0x5, 0x0, 0x10, 0x20, 0x80, 0x3, [@generic={0xd9, 0xb, "aca4fa4252d9ed94294cf72d77e1acb265500fc4cfda6409078e8d237d15fba5e6301f3ac2835dc96ba8147ce6f2333e065bb99f211b00d266aa790b2c82fe9be07397447db4411aa1d7b0b7b436cc4a6d911787a8c8217f8844ff4db722fa17b0b02d2a45add096a2ca67699b53d6eba77da61d104092f89df48c6f4960d78ef3e00afc9726e49231de367635f0aa33ed95dfc5e10685e06d65d7e7f9c69a37fb54ebbb4aa48653621e2fb082255461d7a514eb6b16fd2b17418755dbf73c27fb7390a88a799f89a69632a7b1c26c62763ab6206a4080"}]}}, {{0x9, 0x5, 0x1, 0x10, 0x400, 0x6, 0x1f, 0x1, [@generic={0xa7, 0x21, "14811a29c5ae1d9910c328e6c77cb2b6d3d558f684f1a8b7b1ba8b1a33a0a48fcf1bf2e9d7b39385e84fd58f4a18b3123759428be33d86fbf505088d455d16326a64df0419df3c331b93f7b85a30ed125322b01eaa450db7698a44cc0a05cf33198561962968485406e815fb0868f08c6a16b37a9d5e03a81eb0df5fee57246db3689f927b9380e894069cad4796691cf02e381ac60e3b3f6b0cc865461b8644619b276ce8"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x5, 0x1000}]}}, {{0x9, 0x5, 0x9, 0x4, 0x40, 0x8, 0x22, 0x1f, [@generic={0xa6, 0xc, "f39e187d06bd2c24cb7a17470178ae886bd270ca5246b031140c7dc39b59a1b8c49fb3f9312b9df72a79096f9a017d89d5f0c7eeee68090487fec50521bb698e1c59814f87036124f3301d2ae6297071b1e25feada1341973b66865a11648613bcdebe40c78646de0604f93ca6e8f621fad79012739775e530b1f3174accf9cb00c70957ea07f9bb6431603351c76190670d498fb95818d6c37a040ff67db0e82baf2083"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x408, 0x8, 0x5, 0x8, [@generic={0x66, 0x31, "c48884bd4e099a7a00cdf4c68eda2f87bf1edd37f52cd990b7e59fc26bd60ab5c59455c46016f13b47502646c4ad549dd20613e6830d2b505a85add960a74e06096b1e3e01fad59a60e0e2ca0a23dd19008a9e4616080e28a420b1215659801217c3627e"}]}}, {{0x9, 0x5, 0x80, 0x8, 0x3ff, 0x0, 0x42, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x8, 0x5}, @generic={0xc0, 0x23, "bb6a114ac086aeab845a9dcbf82da6ce1da151c285b8b20f9cc185d697d205c321e2537a3ec0dc14a1a8ed660d92b8222ed6f2730feca67f8327eb6d799a3e8d6a9dca9e74b20eb60bcd7f6d7cce6dc09405d83c5b7cc35eeb5dc8b5cb0f4f1b0cbc5cacfb5c00a9ecb6f032a4cbea22f2dd9148c49dc831a26d2d6889d2253ba72f2d6dab1b3f06723e92da2126200190f1a3f0d1c400d3c1d0297c3757ce9488e1ec1a3df18958a1bac48938932215c3dda45526da9990e22cac6400c4"}]}}]}}, {{0x9, 0x4, 0x5d, 0x7, 0x2, 0xff, 0x4, 0x6a, 0x0, [@cdc_ncm={{0x9, 0x24, 0x6, 0x0, 0x1, "1c3ecb34"}, {0x5, 0x24, 0x0, 0xc3}, {0xd, 0x24, 0xf, 0x1, 0x3, 0x7fff, 0x80, 0x6}, {0x6, 0x24, 0x1a, 0xfff, 0x9}, [@mdlm={0x15, 0x24, 0x12, 0x1}, @mdlm={0x15, 0x24, 0x12, 0x4}]}, @hid_hid={0x9, 0x21, 0x3ff, 0xa8, 0x1, {0x22, 0x8e1}}], [{{0x9, 0x5, 0xa, 0x0, 0x1ff, 0x8, 0x9, 0x2, [@generic={0xb8, 0x8, "9f46b267cb58a7c1fa16ff61167d9d2369f58b1558c2c37a6a37b3c268d2da094168472bea1583a16a91e4d25e25418bff3e2e0b798e27602f5acf670328aea1daa77846d357aa9133fc204a05909eb4e0d192d75733d8562783ce1beaf39104e319af5f57deebc72765ceb88693fbd642b77258c958e8b9a47f3a729d8714d6e955b5dd9588f73aa391ed95de7ec10df48b6f19a838c38d3fa101692300f9000658e4783e6b70dd8bc6efd13c9763ae2300f717ddd2"}, @generic={0x3b, 0x9, "77c55219d510f22748060924fc9aa3c551fc47663a5e7ed83c2529fe1c65e2c2b09a22e2fded72ccafcb0f2b1f06bc6208fc1136c2aa175eea"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x8, 0x0, 0x2, 0x7f, [@generic={0x73, 0x31, "1bc282f8d117622ad1a0b701b02987fcefd6f13fc54d192d0fc7ae1201f01a04d0713dfbefe000b24ce416470e95ddfdc78ffc0801eafc576bd731301f605d434b3c57c2ec4ab03cd23cc30e230bfaf26ef10ec785dac881e2e102c40c5451f98a0960b6c068825ef779ca08eac2dbcb9f"}]}}]}}, {{0x9, 0x4, 0xd4, 0x1, 0x4, 0xe0, 0xa0, 0xb3, 0x9, [@hid_hid={0x9, 0x21, 0x0, 0x6, 0x1, {0x22, 0xcd2}}], [{{0x9, 0x5, 0xb, 0x0, 0x10, 0x3f, 0x7f, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x49, 0x5}]}}, {{0x9, 0x5, 0x1, 0x6, 0x8, 0x56, 0x2, 0x40, [@generic={0xba, 0x7, "e87340d296e8079cf3e731e2664ef4ad6999e19ab5656098ad33c34293721a854af5158b07f18bc5c1f6f0e40415efa10c7f33d2977f69e03d8d1141f258cf46f8f6c993910f86d7f11008453ff6711600485c0fa031afbe3630d9f21a765ca562b9f4e6563f3b522bfe86888d42aeb5d7c4e8d1c64310acccf6856676e635cce92ea242c0a6b0697108f2681a1caa33a364b23005ac20f32ae04af7e57092456512bb744aaddcbc6cfb93b924d095eead0bbe058969d640"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x3, 0x8001}]}}, {{0x9, 0x5, 0x0, 0x4, 0x3ff, 0x6, 0x1, 0xff, [@generic={0x31, 0x24, "f421d3d35748dccbcfda43aa3a8f0860a1aa51a2dc3ccbcdc9e800eb0624b0be188f1b3037ec8b4a8e512febdde11c"}]}}, {{0x9, 0x5, 0x9, 0x10, 0x44c, 0x81, 0x8, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xfc, 0x1}, @generic={0xde, 0x2f, "092caeb0108a3184a6168a36eaf452d75bdff776807bb7a70ae41e824272f29580b817874618e4392fac659c2d5c18f8255a00aa5528bccf9d27ff0524877f19807a1e9eb4173f86fc759098ce0a4bb7420e5f9b8338c5b56ac348553df30aefbf639c7e5257e635cc4a0a283ce3b42557e5365de92e82132b5b9e4ab3f5ac9e2235262535d8e8ba7b6d6301bca94b6c4f8ceba8369962bfc1be95053d2c9aba7367386a9c92e826d6a54cf3edff9abb0acbabc2db6548003cac4bf644304590d3f74cf38b51db4c38fdd0a5c42acc57dbb14bbb97f3cee13ce9db90"}]}}]}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x110, 0xb7, 0x8, 0xe0, 0x10, 0x9}, 0x5d, &(0x7f0000000340)={0x5, 0xf, 0x5d, 0x6, [@wireless={0xb, 0x10, 0x1, 0x2, 0x4, 0x1f, 0x1, 0x1, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "bb06cedd1b4e28ff4c1a21b2ce1e8892"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x9, 0x9, 0x1, 0x80}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0xa, 0xb, 0x1f}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "f6cac795c53a73ed6a93ea94bf96be2a"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "18b321f66d2fdfc4b1955ba406f93a82"}]}, 0x1, [{0xbd, &(0x7f00000003c0)=@string={0xbd, 0x3, "f342dee56c73e334ac155b8d1a9816b9ab6651172fa0470aea9399febc1eee2aae09949862c2a825e6246b98fa0e4512584891cce4e0f767848a82d2470be4fbd1ebc1cb5dc09d98580a582584baa75c156f72345ae5d5eabbef957bed4c7e6177b705e4faf688ac8b0acceff768cd2cdcf23e024d75043a297465687d82cbd67f4d3bf57d8b79c1d50a56fff74fdc1237579701b4d1f679129e55d7573be3d7c6b7123612e7732dd51b314b2eb612f7a53df55139610f93028f47"}}]}) syz_usb_disconnect(r1) getsockopt$MRT(r0, 0x0, 0xcf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x9, 0x20, 0x10, "210272cb635dcaffeeb6679d02e9ea99b5b0df2a89fffffffffffffffb0dee3e68f686391e2d5eebf58a18fcae1ea91ad44cc7af5ae033955c1ad11784240fb1", "a54164365100000800435981500000b91bfe62dcf1a701c7986bf133d4db87539b86094d2f2faa5800", "899402ba9dc4c7b342af83749819d201d80fb05e6117d7c7dfed0a6f3068cffb", [0xfffffffffffffffa, 0xa6e]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)={0x0, 0x0, 0x18}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'tunl0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x8000, 0xff, 0x1f, {{0x13, 0x4, 0x0, 0x35, 0x4c, 0x65, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@lsrr={0x83, 0xf, 0x59, [@rand_addr=0x64010101, @local, @private=0xa010102]}, @noop, @lsrr={0x83, 0x7, 0xd2, [@private=0xa010101]}, @timestamp_prespec={0x44, 0x14, 0xf1, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x400}]}, @timestamp={0x44, 0x8, 0x81, 0x0, 0x7, [0x3]}, @timestamp_addr={0x44, 0x4, 0x1, 0x1, 0x8}]}}}}}) syz_open_dev$loop(&(0x7f0000000100), 0x88d9, 0x40000) 00:12:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 738.382189][T22937] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 738.387193][T22937] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:12:18 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0xb, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:18 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:18 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f0000000000)={@any, 0x9}) 00:12:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:18 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f0000000000)={@any, 0x9}) 00:12:18 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) (async) r1 = syz_usb_connect(0x3, 0xc09, &(0x7f0000000b40)={{0x12, 0x1, 0x110, 0x6d, 0x9b, 0xc0, 0x10, 0x187f, 0x302, 0x817, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xbf7, 0x3, 0x5, 0xe1, 0x90, 0x5, [{{0x9, 0x4, 0x0, 0x5, 0xd, 0xb6, 0x6b, 0x54, 0x13, [@generic={0xe2, 0x23, "7a135dc100e8e7cc0545b933efe6186650fa4d6ff8ff9fc6d10c134a23bfbb74887d4aa605f5c5d4830b8e73d1077874aa7f91199d1556a5ed06dcde8c52af76321c341be3d7f1191b9ae487d9bedc3c24ee98fff2cbcfdc58240ece44e8b1460632e4385af1ec2e0fde5bae7172a44c018cf0ea7e1b37814f0b6fd97021b0c20f4e0cd845f7a1a64a146e7c35e6bf2ea0b26297cedeabe910d0fce966ac5ad60179ef7591dc8a65ab0f543e997d4eab639c302a73287b25af116698ffe04f1badac7fbf39321b595db550da19b44380cc29ccabe8229201c7341b8fee337e4d"}], [{{0x9, 0x5, 0x3, 0x0, 0x20, 0xff, 0x92, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xad, 0x1}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x0, 0x9}]}}, {{0x9, 0x5, 0x6, 0x1, 0x200, 0x9, 0x0, 0x9, [@generic={0x8b, 0xa, "9d57533c1ba63b12a5ff9df5b4b9750ed4eef8ce0d29cb07bdafc6a6fedb6d77d5e1e88fa00238f71708e72c3ae09b23573789cb02e3586b68def0ca1cb058469af9216d4af47f8d1e751312387dd73ac2b604640f37c7a97ab70efdcebd398796a8da1f73a489b754e83716d744d13150c8a14c0f7ec50644ac0c4705d6d3df4b66262168cd15cee4"}]}}, {{0x9, 0x5, 0xc, 0x0, 0x3ff, 0x0, 0x3, 0xc, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x5, 0x3}]}}, {{0x9, 0x5, 0x2, 0x4, 0x28, 0x0, 0x40, 0x40, [@generic={0x2d, 0x31, "4b019e17c14610a75bba08075ba34f680fa01804b12180ea718c3d6ca26ca189829eff3cbb86c68858f8ae"}, @generic={0xb3, 0xb, "8c7b81e6fbeba6e961044b82ca11b41e3ed227e77801e489384134008c874cb5e1e3374b3cce73b8feaa6fe2188c1140e3ee90a1e608079eb6ab1569ace1d4a8fb2cde9b9535081b7e6c753079a2d2046e98274f410ac0e9520f1fcdd2df89a3adee4fea425b814de64f097f7765b2481b9ae6a5ad330f60039736d04df527a5b36143d7c1b8c747d8078a2435e2abaaa47f2cfa88bace765beec113e192b7014f8e0c24ba9e9f647a5c399d92757b1e72"}]}}, {{0x9, 0x5, 0xb, 0x10, 0x8, 0x4, 0x0, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x9}]}}, {{0x9, 0x5, 0x2, 0x10, 0x20, 0x20, 0x0, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x5, 0x3}]}}, {{0x9, 0x5, 0x7, 0x4, 0x200, 0x4, 0x8, 0x9, [@generic={0xe0, 0x10, "07f49d639f75d400d6abe0771d265ca87ba6d6995670761d98bb81a56c47828afe3e4f344aa778938ceb36678b36b0cf53bf5e4696853b7def97dacf969eec79c580987120676338746f3a5fe04b04042573709aca6e6993e7bb7c9042781e19c282e9515d4a505c1b86dab3c7578d9eff062562eb7020c5c0cd47720881fce52bf447db4ec6d4485c4b03deb6350d2f65c95fea9fbc12a8934aa434596dcaae56712fb690a17d68e71d2ac377fab9f7717ea5dbbc0a0dbf48c859b30f658323c572f507e020973f10c070b4aa0ba9cb1e0dce42e014c5e5cdcac2004cc7"}]}}, {{0x9, 0x5, 0xb, 0x8, 0x10, 0x3f, 0x7, 0x81, [@generic={0xdd, 0x24, "9bfde775d18e5240467003251666c37b63ecf76d83b51941878dcae90135f728bd954117607e9d0703707efca1c8d16536ac4b8b02ccce1f36f4128365b037f7a98365f8f37c9907bde723b02d5db3113a58296f01ef1f85a30bc11facff51510c2f007784115330ad0ae44a22885aa93892680b3aae2aa5a886a7e1314bed5610a447f26eab10d7c7ea6e344501c5daec8882d6354bf482d32bac5cb2e3c60d36ab58845a819ad5c9693b197553d69e293f4b6ff3c4d5de3ea409b2bb46008aca955aa97239a502f74684e1a196ef75132780bbaeec91f60ff9b0"}]}}, {{0x9, 0x5, 0x5, 0x0, 0x10, 0x20, 0x80, 0x3, [@generic={0xd9, 0xb, "aca4fa4252d9ed94294cf72d77e1acb265500fc4cfda6409078e8d237d15fba5e6301f3ac2835dc96ba8147ce6f2333e065bb99f211b00d266aa790b2c82fe9be07397447db4411aa1d7b0b7b436cc4a6d911787a8c8217f8844ff4db722fa17b0b02d2a45add096a2ca67699b53d6eba77da61d104092f89df48c6f4960d78ef3e00afc9726e49231de367635f0aa33ed95dfc5e10685e06d65d7e7f9c69a37fb54ebbb4aa48653621e2fb082255461d7a514eb6b16fd2b17418755dbf73c27fb7390a88a799f89a69632a7b1c26c62763ab6206a4080"}]}}, {{0x9, 0x5, 0x1, 0x10, 0x400, 0x6, 0x1f, 0x1, [@generic={0xa7, 0x21, "14811a29c5ae1d9910c328e6c77cb2b6d3d558f684f1a8b7b1ba8b1a33a0a48fcf1bf2e9d7b39385e84fd58f4a18b3123759428be33d86fbf505088d455d16326a64df0419df3c331b93f7b85a30ed125322b01eaa450db7698a44cc0a05cf33198561962968485406e815fb0868f08c6a16b37a9d5e03a81eb0df5fee57246db3689f927b9380e894069cad4796691cf02e381ac60e3b3f6b0cc865461b8644619b276ce8"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x5, 0x1000}]}}, {{0x9, 0x5, 0x9, 0x4, 0x40, 0x8, 0x22, 0x1f, [@generic={0xa6, 0xc, "f39e187d06bd2c24cb7a17470178ae886bd270ca5246b031140c7dc39b59a1b8c49fb3f9312b9df72a79096f9a017d89d5f0c7eeee68090487fec50521bb698e1c59814f87036124f3301d2ae6297071b1e25feada1341973b66865a11648613bcdebe40c78646de0604f93ca6e8f621fad79012739775e530b1f3174accf9cb00c70957ea07f9bb6431603351c76190670d498fb95818d6c37a040ff67db0e82baf2083"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x408, 0x8, 0x5, 0x8, [@generic={0x66, 0x31, "c48884bd4e099a7a00cdf4c68eda2f87bf1edd37f52cd990b7e59fc26bd60ab5c59455c46016f13b47502646c4ad549dd20613e6830d2b505a85add960a74e06096b1e3e01fad59a60e0e2ca0a23dd19008a9e4616080e28a420b1215659801217c3627e"}]}}, {{0x9, 0x5, 0x80, 0x8, 0x3ff, 0x0, 0x42, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x8, 0x5}, @generic={0xc0, 0x23, "bb6a114ac086aeab845a9dcbf82da6ce1da151c285b8b20f9cc185d697d205c321e2537a3ec0dc14a1a8ed660d92b8222ed6f2730feca67f8327eb6d799a3e8d6a9dca9e74b20eb60bcd7f6d7cce6dc09405d83c5b7cc35eeb5dc8b5cb0f4f1b0cbc5cacfb5c00a9ecb6f032a4cbea22f2dd9148c49dc831a26d2d6889d2253ba72f2d6dab1b3f06723e92da2126200190f1a3f0d1c400d3c1d0297c3757ce9488e1ec1a3df18958a1bac48938932215c3dda45526da9990e22cac6400c4"}]}}]}}, {{0x9, 0x4, 0x5d, 0x7, 0x2, 0xff, 0x4, 0x6a, 0x0, [@cdc_ncm={{0x9, 0x24, 0x6, 0x0, 0x1, "1c3ecb34"}, {0x5, 0x24, 0x0, 0xc3}, {0xd, 0x24, 0xf, 0x1, 0x3, 0x7fff, 0x80, 0x6}, {0x6, 0x24, 0x1a, 0xfff, 0x9}, [@mdlm={0x15, 0x24, 0x12, 0x1}, @mdlm={0x15, 0x24, 0x12, 0x4}]}, @hid_hid={0x9, 0x21, 0x3ff, 0xa8, 0x1, {0x22, 0x8e1}}], [{{0x9, 0x5, 0xa, 0x0, 0x1ff, 0x8, 0x9, 0x2, [@generic={0xb8, 0x8, "9f46b267cb58a7c1fa16ff61167d9d2369f58b1558c2c37a6a37b3c268d2da094168472bea1583a16a91e4d25e25418bff3e2e0b798e27602f5acf670328aea1daa77846d357aa9133fc204a05909eb4e0d192d75733d8562783ce1beaf39104e319af5f57deebc72765ceb88693fbd642b77258c958e8b9a47f3a729d8714d6e955b5dd9588f73aa391ed95de7ec10df48b6f19a838c38d3fa101692300f9000658e4783e6b70dd8bc6efd13c9763ae2300f717ddd2"}, @generic={0x3b, 0x9, "77c55219d510f22748060924fc9aa3c551fc47663a5e7ed83c2529fe1c65e2c2b09a22e2fded72ccafcb0f2b1f06bc6208fc1136c2aa175eea"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x8, 0x0, 0x2, 0x7f, [@generic={0x73, 0x31, "1bc282f8d117622ad1a0b701b02987fcefd6f13fc54d192d0fc7ae1201f01a04d0713dfbefe000b24ce416470e95ddfdc78ffc0801eafc576bd731301f605d434b3c57c2ec4ab03cd23cc30e230bfaf26ef10ec785dac881e2e102c40c5451f98a0960b6c068825ef779ca08eac2dbcb9f"}]}}]}}, {{0x9, 0x4, 0xd4, 0x1, 0x4, 0xe0, 0xa0, 0xb3, 0x9, [@hid_hid={0x9, 0x21, 0x0, 0x6, 0x1, {0x22, 0xcd2}}], [{{0x9, 0x5, 0xb, 0x0, 0x10, 0x3f, 0x7f, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x49, 0x5}]}}, {{0x9, 0x5, 0x1, 0x6, 0x8, 0x56, 0x2, 0x40, [@generic={0xba, 0x7, "e87340d296e8079cf3e731e2664ef4ad6999e19ab5656098ad33c34293721a854af5158b07f18bc5c1f6f0e40415efa10c7f33d2977f69e03d8d1141f258cf46f8f6c993910f86d7f11008453ff6711600485c0fa031afbe3630d9f21a765ca562b9f4e6563f3b522bfe86888d42aeb5d7c4e8d1c64310acccf6856676e635cce92ea242c0a6b0697108f2681a1caa33a364b23005ac20f32ae04af7e57092456512bb744aaddcbc6cfb93b924d095eead0bbe058969d640"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x3, 0x8001}]}}, {{0x9, 0x5, 0x0, 0x4, 0x3ff, 0x6, 0x1, 0xff, [@generic={0x31, 0x24, "f421d3d35748dccbcfda43aa3a8f0860a1aa51a2dc3ccbcdc9e800eb0624b0be188f1b3037ec8b4a8e512febdde11c"}]}}, {{0x9, 0x5, 0x9, 0x10, 0x44c, 0x81, 0x8, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xfc, 0x1}, @generic={0xde, 0x2f, "092caeb0108a3184a6168a36eaf452d75bdff776807bb7a70ae41e824272f29580b817874618e4392fac659c2d5c18f8255a00aa5528bccf9d27ff0524877f19807a1e9eb4173f86fc759098ce0a4bb7420e5f9b8338c5b56ac348553df30aefbf639c7e5257e635cc4a0a283ce3b42557e5365de92e82132b5b9e4ab3f5ac9e2235262535d8e8ba7b6d6301bca94b6c4f8ceba8369962bfc1be95053d2c9aba7367386a9c92e826d6a54cf3edff9abb0acbabc2db6548003cac4bf644304590d3f74cf38b51db4c38fdd0a5c42acc57dbb14bbb97f3cee13ce9db90"}]}}]}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x110, 0xb7, 0x8, 0xe0, 0x10, 0x9}, 0x5d, &(0x7f0000000340)={0x5, 0xf, 0x5d, 0x6, [@wireless={0xb, 0x10, 0x1, 0x2, 0x4, 0x1f, 0x1, 0x1, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "bb06cedd1b4e28ff4c1a21b2ce1e8892"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x9, 0x9, 0x1, 0x80}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0xa, 0xb, 0x1f}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "f6cac795c53a73ed6a93ea94bf96be2a"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "18b321f66d2fdfc4b1955ba406f93a82"}]}, 0x1, [{0xbd, &(0x7f00000003c0)=@string={0xbd, 0x3, "f342dee56c73e334ac155b8d1a9816b9ab6651172fa0470aea9399febc1eee2aae09949862c2a825e6246b98fa0e4512584891cce4e0f767848a82d2470be4fbd1ebc1cb5dc09d98580a582584baa75c156f72345ae5d5eabbef957bed4c7e6177b705e4faf688ac8b0acceff768cd2cdcf23e024d75043a297465687d82cbd67f4d3bf57d8b79c1d50a56fff74fdc1237579701b4d1f679129e55d7573be3d7c6b7123612e7732dd51b314b2eb612f7a53df55139610f93028f47"}}]}) syz_usb_disconnect(r1) (async) getsockopt$MRT(r0, 0x0, 0xcf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) (async) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) (async) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x9, 0x20, 0x10, "210272cb635dcaffeeb6679d02e9ea99b5b0df2a89fffffffffffffffb0dee3e68f686391e2d5eebf58a18fcae1ea91ad44cc7af5ae033955c1ad11784240fb1", "a54164365100000800435981500000b91bfe62dcf1a701c7986bf133d4db87539b86094d2f2faa5800", "899402ba9dc4c7b342af83749819d201d80fb05e6117d7c7dfed0a6f3068cffb", [0xfffffffffffffffa, 0xa6e]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)={0x0, 0x0, 0x18}, 0x10) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'tunl0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x8000, 0xff, 0x1f, {{0x13, 0x4, 0x0, 0x35, 0x4c, 0x65, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@lsrr={0x83, 0xf, 0x59, [@rand_addr=0x64010101, @local, @private=0xa010102]}, @noop, @lsrr={0x83, 0x7, 0xd2, [@private=0xa010101]}, @timestamp_prespec={0x44, 0x14, 0xf1, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x400}]}, @timestamp={0x44, 0x8, 0x81, 0x0, 0x7, [0x3]}, @timestamp_addr={0x44, 0x4, 0x1, 0x1, 0x8}]}}}}}) syz_open_dev$loop(&(0x7f0000000100), 0x88d9, 0x40000) 00:12:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:19 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:19 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xfffffffffffffe05) 00:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:19 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0xc, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) [ 739.131123][T22978] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 00:12:19 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) [ 739.137272][T22978] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:12:19 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xfffffffffffffe05) 00:12:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x19, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:19 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) r1 = syz_usb_connect(0x3, 0xc09, &(0x7f0000000b40)={{0x12, 0x1, 0x110, 0x6d, 0x9b, 0xc0, 0x10, 0x187f, 0x302, 0x817, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xbf7, 0x3, 0x5, 0xe1, 0x90, 0x5, [{{0x9, 0x4, 0x0, 0x5, 0xd, 0xb6, 0x6b, 0x54, 0x13, [@generic={0xe2, 0x23, "7a135dc100e8e7cc0545b933efe6186650fa4d6ff8ff9fc6d10c134a23bfbb74887d4aa605f5c5d4830b8e73d1077874aa7f91199d1556a5ed06dcde8c52af76321c341be3d7f1191b9ae487d9bedc3c24ee98fff2cbcfdc58240ece44e8b1460632e4385af1ec2e0fde5bae7172a44c018cf0ea7e1b37814f0b6fd97021b0c20f4e0cd845f7a1a64a146e7c35e6bf2ea0b26297cedeabe910d0fce966ac5ad60179ef7591dc8a65ab0f543e997d4eab639c302a73287b25af116698ffe04f1badac7fbf39321b595db550da19b44380cc29ccabe8229201c7341b8fee337e4d"}], [{{0x9, 0x5, 0x3, 0x0, 0x20, 0xff, 0x92, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xad, 0x1}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x0, 0x9}]}}, {{0x9, 0x5, 0x6, 0x1, 0x200, 0x9, 0x0, 0x9, [@generic={0x8b, 0xa, "9d57533c1ba63b12a5ff9df5b4b9750ed4eef8ce0d29cb07bdafc6a6fedb6d77d5e1e88fa00238f71708e72c3ae09b23573789cb02e3586b68def0ca1cb058469af9216d4af47f8d1e751312387dd73ac2b604640f37c7a97ab70efdcebd398796a8da1f73a489b754e83716d744d13150c8a14c0f7ec50644ac0c4705d6d3df4b66262168cd15cee4"}]}}, {{0x9, 0x5, 0xc, 0x0, 0x3ff, 0x0, 0x3, 0xc, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x5, 0x3}]}}, {{0x9, 0x5, 0x2, 0x4, 0x28, 0x0, 0x40, 0x40, [@generic={0x2d, 0x31, "4b019e17c14610a75bba08075ba34f680fa01804b12180ea718c3d6ca26ca189829eff3cbb86c68858f8ae"}, @generic={0xb3, 0xb, "8c7b81e6fbeba6e961044b82ca11b41e3ed227e77801e489384134008c874cb5e1e3374b3cce73b8feaa6fe2188c1140e3ee90a1e608079eb6ab1569ace1d4a8fb2cde9b9535081b7e6c753079a2d2046e98274f410ac0e9520f1fcdd2df89a3adee4fea425b814de64f097f7765b2481b9ae6a5ad330f60039736d04df527a5b36143d7c1b8c747d8078a2435e2abaaa47f2cfa88bace765beec113e192b7014f8e0c24ba9e9f647a5c399d92757b1e72"}]}}, {{0x9, 0x5, 0xb, 0x10, 0x8, 0x4, 0x0, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x9}]}}, {{0x9, 0x5, 0x2, 0x10, 0x20, 0x20, 0x0, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x5, 0x3}]}}, {{0x9, 0x5, 0x7, 0x4, 0x200, 0x4, 0x8, 0x9, [@generic={0xe0, 0x10, "07f49d639f75d400d6abe0771d265ca87ba6d6995670761d98bb81a56c47828afe3e4f344aa778938ceb36678b36b0cf53bf5e4696853b7def97dacf969eec79c580987120676338746f3a5fe04b04042573709aca6e6993e7bb7c9042781e19c282e9515d4a505c1b86dab3c7578d9eff062562eb7020c5c0cd47720881fce52bf447db4ec6d4485c4b03deb6350d2f65c95fea9fbc12a8934aa434596dcaae56712fb690a17d68e71d2ac377fab9f7717ea5dbbc0a0dbf48c859b30f658323c572f507e020973f10c070b4aa0ba9cb1e0dce42e014c5e5cdcac2004cc7"}]}}, {{0x9, 0x5, 0xb, 0x8, 0x10, 0x3f, 0x7, 0x81, [@generic={0xdd, 0x24, "9bfde775d18e5240467003251666c37b63ecf76d83b51941878dcae90135f728bd954117607e9d0703707efca1c8d16536ac4b8b02ccce1f36f4128365b037f7a98365f8f37c9907bde723b02d5db3113a58296f01ef1f85a30bc11facff51510c2f007784115330ad0ae44a22885aa93892680b3aae2aa5a886a7e1314bed5610a447f26eab10d7c7ea6e344501c5daec8882d6354bf482d32bac5cb2e3c60d36ab58845a819ad5c9693b197553d69e293f4b6ff3c4d5de3ea409b2bb46008aca955aa97239a502f74684e1a196ef75132780bbaeec91f60ff9b0"}]}}, {{0x9, 0x5, 0x5, 0x0, 0x10, 0x20, 0x80, 0x3, [@generic={0xd9, 0xb, "aca4fa4252d9ed94294cf72d77e1acb265500fc4cfda6409078e8d237d15fba5e6301f3ac2835dc96ba8147ce6f2333e065bb99f211b00d266aa790b2c82fe9be07397447db4411aa1d7b0b7b436cc4a6d911787a8c8217f8844ff4db722fa17b0b02d2a45add096a2ca67699b53d6eba77da61d104092f89df48c6f4960d78ef3e00afc9726e49231de367635f0aa33ed95dfc5e10685e06d65d7e7f9c69a37fb54ebbb4aa48653621e2fb082255461d7a514eb6b16fd2b17418755dbf73c27fb7390a88a799f89a69632a7b1c26c62763ab6206a4080"}]}}, {{0x9, 0x5, 0x1, 0x10, 0x400, 0x6, 0x1f, 0x1, [@generic={0xa7, 0x21, "14811a29c5ae1d9910c328e6c77cb2b6d3d558f684f1a8b7b1ba8b1a33a0a48fcf1bf2e9d7b39385e84fd58f4a18b3123759428be33d86fbf505088d455d16326a64df0419df3c331b93f7b85a30ed125322b01eaa450db7698a44cc0a05cf33198561962968485406e815fb0868f08c6a16b37a9d5e03a81eb0df5fee57246db3689f927b9380e894069cad4796691cf02e381ac60e3b3f6b0cc865461b8644619b276ce8"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x5, 0x1000}]}}, {{0x9, 0x5, 0x9, 0x4, 0x40, 0x8, 0x22, 0x1f, [@generic={0xa6, 0xc, "f39e187d06bd2c24cb7a17470178ae886bd270ca5246b031140c7dc39b59a1b8c49fb3f9312b9df72a79096f9a017d89d5f0c7eeee68090487fec50521bb698e1c59814f87036124f3301d2ae6297071b1e25feada1341973b66865a11648613bcdebe40c78646de0604f93ca6e8f621fad79012739775e530b1f3174accf9cb00c70957ea07f9bb6431603351c76190670d498fb95818d6c37a040ff67db0e82baf2083"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x408, 0x8, 0x5, 0x8, [@generic={0x66, 0x31, "c48884bd4e099a7a00cdf4c68eda2f87bf1edd37f52cd990b7e59fc26bd60ab5c59455c46016f13b47502646c4ad549dd20613e6830d2b505a85add960a74e06096b1e3e01fad59a60e0e2ca0a23dd19008a9e4616080e28a420b1215659801217c3627e"}]}}, {{0x9, 0x5, 0x80, 0x8, 0x3ff, 0x0, 0x42, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x8, 0x5}, @generic={0xc0, 0x23, "bb6a114ac086aeab845a9dcbf82da6ce1da151c285b8b20f9cc185d697d205c321e2537a3ec0dc14a1a8ed660d92b8222ed6f2730feca67f8327eb6d799a3e8d6a9dca9e74b20eb60bcd7f6d7cce6dc09405d83c5b7cc35eeb5dc8b5cb0f4f1b0cbc5cacfb5c00a9ecb6f032a4cbea22f2dd9148c49dc831a26d2d6889d2253ba72f2d6dab1b3f06723e92da2126200190f1a3f0d1c400d3c1d0297c3757ce9488e1ec1a3df18958a1bac48938932215c3dda45526da9990e22cac6400c4"}]}}]}}, {{0x9, 0x4, 0x5d, 0x7, 0x2, 0xff, 0x4, 0x6a, 0x0, [@cdc_ncm={{0x9, 0x24, 0x6, 0x0, 0x1, "1c3ecb34"}, {0x5, 0x24, 0x0, 0xc3}, {0xd, 0x24, 0xf, 0x1, 0x3, 0x7fff, 0x80, 0x6}, {0x6, 0x24, 0x1a, 0xfff, 0x9}, [@mdlm={0x15, 0x24, 0x12, 0x1}, @mdlm={0x15, 0x24, 0x12, 0x4}]}, @hid_hid={0x9, 0x21, 0x3ff, 0xa8, 0x1, {0x22, 0x8e1}}], [{{0x9, 0x5, 0xa, 0x0, 0x1ff, 0x8, 0x9, 0x2, [@generic={0xb8, 0x8, "9f46b267cb58a7c1fa16ff61167d9d2369f58b1558c2c37a6a37b3c268d2da094168472bea1583a16a91e4d25e25418bff3e2e0b798e27602f5acf670328aea1daa77846d357aa9133fc204a05909eb4e0d192d75733d8562783ce1beaf39104e319af5f57deebc72765ceb88693fbd642b77258c958e8b9a47f3a729d8714d6e955b5dd9588f73aa391ed95de7ec10df48b6f19a838c38d3fa101692300f9000658e4783e6b70dd8bc6efd13c9763ae2300f717ddd2"}, @generic={0x3b, 0x9, "77c55219d510f22748060924fc9aa3c551fc47663a5e7ed83c2529fe1c65e2c2b09a22e2fded72ccafcb0f2b1f06bc6208fc1136c2aa175eea"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x8, 0x0, 0x2, 0x7f, [@generic={0x73, 0x31, "1bc282f8d117622ad1a0b701b02987fcefd6f13fc54d192d0fc7ae1201f01a04d0713dfbefe000b24ce416470e95ddfdc78ffc0801eafc576bd731301f605d434b3c57c2ec4ab03cd23cc30e230bfaf26ef10ec785dac881e2e102c40c5451f98a0960b6c068825ef779ca08eac2dbcb9f"}]}}]}}, {{0x9, 0x4, 0xd4, 0x1, 0x4, 0xe0, 0xa0, 0xb3, 0x9, [@hid_hid={0x9, 0x21, 0x0, 0x6, 0x1, {0x22, 0xcd2}}], [{{0x9, 0x5, 0xb, 0x0, 0x10, 0x3f, 0x7f, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x49, 0x5}]}}, {{0x9, 0x5, 0x1, 0x6, 0x8, 0x56, 0x2, 0x40, [@generic={0xba, 0x7, "e87340d296e8079cf3e731e2664ef4ad6999e19ab5656098ad33c34293721a854af5158b07f18bc5c1f6f0e40415efa10c7f33d2977f69e03d8d1141f258cf46f8f6c993910f86d7f11008453ff6711600485c0fa031afbe3630d9f21a765ca562b9f4e6563f3b522bfe86888d42aeb5d7c4e8d1c64310acccf6856676e635cce92ea242c0a6b0697108f2681a1caa33a364b23005ac20f32ae04af7e57092456512bb744aaddcbc6cfb93b924d095eead0bbe058969d640"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x3, 0x8001}]}}, {{0x9, 0x5, 0x0, 0x4, 0x3ff, 0x6, 0x1, 0xff, [@generic={0x31, 0x24, "f421d3d35748dccbcfda43aa3a8f0860a1aa51a2dc3ccbcdc9e800eb0624b0be188f1b3037ec8b4a8e512febdde11c"}]}}, {{0x9, 0x5, 0x9, 0x10, 0x44c, 0x81, 0x8, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xfc, 0x1}, @generic={0xde, 0x2f, "092caeb0108a3184a6168a36eaf452d75bdff776807bb7a70ae41e824272f29580b817874618e4392fac659c2d5c18f8255a00aa5528bccf9d27ff0524877f19807a1e9eb4173f86fc759098ce0a4bb7420e5f9b8338c5b56ac348553df30aefbf639c7e5257e635cc4a0a283ce3b42557e5365de92e82132b5b9e4ab3f5ac9e2235262535d8e8ba7b6d6301bca94b6c4f8ceba8369962bfc1be95053d2c9aba7367386a9c92e826d6a54cf3edff9abb0acbabc2db6548003cac4bf644304590d3f74cf38b51db4c38fdd0a5c42acc57dbb14bbb97f3cee13ce9db90"}]}}]}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x110, 0xb7, 0x8, 0xe0, 0x10, 0x9}, 0x5d, &(0x7f0000000340)={0x5, 0xf, 0x5d, 0x6, [@wireless={0xb, 0x10, 0x1, 0x2, 0x4, 0x1f, 0x1, 0x1, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "bb06cedd1b4e28ff4c1a21b2ce1e8892"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x9, 0x9, 0x1, 0x80}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0xa, 0xb, 0x1f}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "f6cac795c53a73ed6a93ea94bf96be2a"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "18b321f66d2fdfc4b1955ba406f93a82"}]}, 0x1, [{0xbd, &(0x7f00000003c0)=@string={0xbd, 0x3, "f342dee56c73e334ac155b8d1a9816b9ab6651172fa0470aea9399febc1eee2aae09949862c2a825e6246b98fa0e4512584891cce4e0f767848a82d2470be4fbd1ebc1cb5dc09d98580a582584baa75c156f72345ae5d5eabbef957bed4c7e6177b705e4faf688ac8b0acceff768cd2cdcf23e024d75043a297465687d82cbd67f4d3bf57d8b79c1d50a56fff74fdc1237579701b4d1f679129e55d7573be3d7c6b7123612e7732dd51b314b2eb612f7a53df55139610f93028f47"}}]}) syz_usb_disconnect(r1) (async) getsockopt$MRT(r0, 0x0, 0xcf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) (async) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) (async) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x9, 0x20, 0x10, "210272cb635dcaffeeb6679d02e9ea99b5b0df2a89fffffffffffffffb0dee3e68f686391e2d5eebf58a18fcae1ea91ad44cc7af5ae033955c1ad11784240fb1", "a54164365100000800435981500000b91bfe62dcf1a701c7986bf133d4db87539b86094d2f2faa5800", "899402ba9dc4c7b342af83749819d201d80fb05e6117d7c7dfed0a6f3068cffb", [0xfffffffffffffffa, 0xa6e]}) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)={0x0, 0x0, 0x18}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'tunl0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x8000, 0xff, 0x1f, {{0x13, 0x4, 0x0, 0x35, 0x4c, 0x65, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@lsrr={0x83, 0xf, 0x59, [@rand_addr=0x64010101, @local, @private=0xa010102]}, @noop, @lsrr={0x83, 0x7, 0xd2, [@private=0xa010101]}, @timestamp_prespec={0x44, 0x14, 0xf1, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x400}]}, @timestamp={0x44, 0x8, 0x81, 0x0, 0x7, [0x3]}, @timestamp_addr={0x44, 0x4, 0x1, 0x1, 0x8}]}}}}}) syz_open_dev$loop(&(0x7f0000000100), 0x88d9, 0x40000) 00:12:19 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xfffffffffffffe05) 00:12:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) r1 = syz_usb_connect(0x3, 0xc09, &(0x7f0000000b40)={{0x12, 0x1, 0x110, 0x6d, 0x9b, 0xc0, 0x10, 0x187f, 0x302, 0x817, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xbf7, 0x3, 0x5, 0xe1, 0x90, 0x5, [{{0x9, 0x4, 0x0, 0x5, 0xd, 0xb6, 0x6b, 0x54, 0x13, [@generic={0xe2, 0x23, "7a135dc100e8e7cc0545b933efe6186650fa4d6ff8ff9fc6d10c134a23bfbb74887d4aa605f5c5d4830b8e73d1077874aa7f91199d1556a5ed06dcde8c52af76321c341be3d7f1191b9ae487d9bedc3c24ee98fff2cbcfdc58240ece44e8b1460632e4385af1ec2e0fde5bae7172a44c018cf0ea7e1b37814f0b6fd97021b0c20f4e0cd845f7a1a64a146e7c35e6bf2ea0b26297cedeabe910d0fce966ac5ad60179ef7591dc8a65ab0f543e997d4eab639c302a73287b25af116698ffe04f1badac7fbf39321b595db550da19b44380cc29ccabe8229201c7341b8fee337e4d"}], [{{0x9, 0x5, 0x3, 0x0, 0x20, 0xff, 0x92, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xad, 0x1}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x0, 0x9}]}}, {{0x9, 0x5, 0x6, 0x1, 0x200, 0x9, 0x0, 0x9, [@generic={0x8b, 0xa, "9d57533c1ba63b12a5ff9df5b4b9750ed4eef8ce0d29cb07bdafc6a6fedb6d77d5e1e88fa00238f71708e72c3ae09b23573789cb02e3586b68def0ca1cb058469af9216d4af47f8d1e751312387dd73ac2b604640f37c7a97ab70efdcebd398796a8da1f73a489b754e83716d744d13150c8a14c0f7ec50644ac0c4705d6d3df4b66262168cd15cee4"}]}}, {{0x9, 0x5, 0xc, 0x0, 0x3ff, 0x0, 0x3, 0xc, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x5, 0x3}]}}, {{0x9, 0x5, 0x2, 0x4, 0x28, 0x0, 0x40, 0x40, [@generic={0x2d, 0x31, "4b019e17c14610a75bba08075ba34f680fa01804b12180ea718c3d6ca26ca189829eff3cbb86c68858f8ae"}, @generic={0xb3, 0xb, "8c7b81e6fbeba6e961044b82ca11b41e3ed227e77801e489384134008c874cb5e1e3374b3cce73b8feaa6fe2188c1140e3ee90a1e608079eb6ab1569ace1d4a8fb2cde9b9535081b7e6c753079a2d2046e98274f410ac0e9520f1fcdd2df89a3adee4fea425b814de64f097f7765b2481b9ae6a5ad330f60039736d04df527a5b36143d7c1b8c747d8078a2435e2abaaa47f2cfa88bace765beec113e192b7014f8e0c24ba9e9f647a5c399d92757b1e72"}]}}, {{0x9, 0x5, 0xb, 0x10, 0x8, 0x4, 0x0, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x9}]}}, {{0x9, 0x5, 0x2, 0x10, 0x20, 0x20, 0x0, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x5, 0x3}]}}, {{0x9, 0x5, 0x7, 0x4, 0x200, 0x4, 0x8, 0x9, [@generic={0xe0, 0x10, "07f49d639f75d400d6abe0771d265ca87ba6d6995670761d98bb81a56c47828afe3e4f344aa778938ceb36678b36b0cf53bf5e4696853b7def97dacf969eec79c580987120676338746f3a5fe04b04042573709aca6e6993e7bb7c9042781e19c282e9515d4a505c1b86dab3c7578d9eff062562eb7020c5c0cd47720881fce52bf447db4ec6d4485c4b03deb6350d2f65c95fea9fbc12a8934aa434596dcaae56712fb690a17d68e71d2ac377fab9f7717ea5dbbc0a0dbf48c859b30f658323c572f507e020973f10c070b4aa0ba9cb1e0dce42e014c5e5cdcac2004cc7"}]}}, {{0x9, 0x5, 0xb, 0x8, 0x10, 0x3f, 0x7, 0x81, [@generic={0xdd, 0x24, "9bfde775d18e5240467003251666c37b63ecf76d83b51941878dcae90135f728bd954117607e9d0703707efca1c8d16536ac4b8b02ccce1f36f4128365b037f7a98365f8f37c9907bde723b02d5db3113a58296f01ef1f85a30bc11facff51510c2f007784115330ad0ae44a22885aa93892680b3aae2aa5a886a7e1314bed5610a447f26eab10d7c7ea6e344501c5daec8882d6354bf482d32bac5cb2e3c60d36ab58845a819ad5c9693b197553d69e293f4b6ff3c4d5de3ea409b2bb46008aca955aa97239a502f74684e1a196ef75132780bbaeec91f60ff9b0"}]}}, {{0x9, 0x5, 0x5, 0x0, 0x10, 0x20, 0x80, 0x3, [@generic={0xd9, 0xb, "aca4fa4252d9ed94294cf72d77e1acb265500fc4cfda6409078e8d237d15fba5e6301f3ac2835dc96ba8147ce6f2333e065bb99f211b00d266aa790b2c82fe9be07397447db4411aa1d7b0b7b436cc4a6d911787a8c8217f8844ff4db722fa17b0b02d2a45add096a2ca67699b53d6eba77da61d104092f89df48c6f4960d78ef3e00afc9726e49231de367635f0aa33ed95dfc5e10685e06d65d7e7f9c69a37fb54ebbb4aa48653621e2fb082255461d7a514eb6b16fd2b17418755dbf73c27fb7390a88a799f89a69632a7b1c26c62763ab6206a4080"}]}}, {{0x9, 0x5, 0x1, 0x10, 0x400, 0x6, 0x1f, 0x1, [@generic={0xa7, 0x21, "14811a29c5ae1d9910c328e6c77cb2b6d3d558f684f1a8b7b1ba8b1a33a0a48fcf1bf2e9d7b39385e84fd58f4a18b3123759428be33d86fbf505088d455d16326a64df0419df3c331b93f7b85a30ed125322b01eaa450db7698a44cc0a05cf33198561962968485406e815fb0868f08c6a16b37a9d5e03a81eb0df5fee57246db3689f927b9380e894069cad4796691cf02e381ac60e3b3f6b0cc865461b8644619b276ce8"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x5, 0x1000}]}}, {{0x9, 0x5, 0x9, 0x4, 0x40, 0x8, 0x22, 0x1f, [@generic={0xa6, 0xc, "f39e187d06bd2c24cb7a17470178ae886bd270ca5246b031140c7dc39b59a1b8c49fb3f9312b9df72a79096f9a017d89d5f0c7eeee68090487fec50521bb698e1c59814f87036124f3301d2ae6297071b1e25feada1341973b66865a11648613bcdebe40c78646de0604f93ca6e8f621fad79012739775e530b1f3174accf9cb00c70957ea07f9bb6431603351c76190670d498fb95818d6c37a040ff67db0e82baf2083"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x408, 0x8, 0x5, 0x8, [@generic={0x66, 0x31, "c48884bd4e099a7a00cdf4c68eda2f87bf1edd37f52cd990b7e59fc26bd60ab5c59455c46016f13b47502646c4ad549dd20613e6830d2b505a85add960a74e06096b1e3e01fad59a60e0e2ca0a23dd19008a9e4616080e28a420b1215659801217c3627e"}]}}, {{0x9, 0x5, 0x80, 0x8, 0x3ff, 0x0, 0x42, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x8, 0x5}, @generic={0xc0, 0x23, "bb6a114ac086aeab845a9dcbf82da6ce1da151c285b8b20f9cc185d697d205c321e2537a3ec0dc14a1a8ed660d92b8222ed6f2730feca67f8327eb6d799a3e8d6a9dca9e74b20eb60bcd7f6d7cce6dc09405d83c5b7cc35eeb5dc8b5cb0f4f1b0cbc5cacfb5c00a9ecb6f032a4cbea22f2dd9148c49dc831a26d2d6889d2253ba72f2d6dab1b3f06723e92da2126200190f1a3f0d1c400d3c1d0297c3757ce9488e1ec1a3df18958a1bac48938932215c3dda45526da9990e22cac6400c4"}]}}]}}, {{0x9, 0x4, 0x5d, 0x7, 0x2, 0xff, 0x4, 0x6a, 0x0, [@cdc_ncm={{0x9, 0x24, 0x6, 0x0, 0x1, "1c3ecb34"}, {0x5, 0x24, 0x0, 0xc3}, {0xd, 0x24, 0xf, 0x1, 0x3, 0x7fff, 0x80, 0x6}, {0x6, 0x24, 0x1a, 0xfff, 0x9}, [@mdlm={0x15, 0x24, 0x12, 0x1}, @mdlm={0x15, 0x24, 0x12, 0x4}]}, @hid_hid={0x9, 0x21, 0x3ff, 0xa8, 0x1, {0x22, 0x8e1}}], [{{0x9, 0x5, 0xa, 0x0, 0x1ff, 0x8, 0x9, 0x2, [@generic={0xb8, 0x8, "9f46b267cb58a7c1fa16ff61167d9d2369f58b1558c2c37a6a37b3c268d2da094168472bea1583a16a91e4d25e25418bff3e2e0b798e27602f5acf670328aea1daa77846d357aa9133fc204a05909eb4e0d192d75733d8562783ce1beaf39104e319af5f57deebc72765ceb88693fbd642b77258c958e8b9a47f3a729d8714d6e955b5dd9588f73aa391ed95de7ec10df48b6f19a838c38d3fa101692300f9000658e4783e6b70dd8bc6efd13c9763ae2300f717ddd2"}, @generic={0x3b, 0x9, "77c55219d510f22748060924fc9aa3c551fc47663a5e7ed83c2529fe1c65e2c2b09a22e2fded72ccafcb0f2b1f06bc6208fc1136c2aa175eea"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x8, 0x0, 0x2, 0x7f, [@generic={0x73, 0x31, "1bc282f8d117622ad1a0b701b02987fcefd6f13fc54d192d0fc7ae1201f01a04d0713dfbefe000b24ce416470e95ddfdc78ffc0801eafc576bd731301f605d434b3c57c2ec4ab03cd23cc30e230bfaf26ef10ec785dac881e2e102c40c5451f98a0960b6c068825ef779ca08eac2dbcb9f"}]}}]}}, {{0x9, 0x4, 0xd4, 0x1, 0x4, 0xe0, 0xa0, 0xb3, 0x9, [@hid_hid={0x9, 0x21, 0x0, 0x6, 0x1, {0x22, 0xcd2}}], [{{0x9, 0x5, 0xb, 0x0, 0x10, 0x3f, 0x7f, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x49, 0x5}]}}, {{0x9, 0x5, 0x1, 0x6, 0x8, 0x56, 0x2, 0x40, [@generic={0xba, 0x7, "e87340d296e8079cf3e731e2664ef4ad6999e19ab5656098ad33c34293721a854af5158b07f18bc5c1f6f0e40415efa10c7f33d2977f69e03d8d1141f258cf46f8f6c993910f86d7f11008453ff6711600485c0fa031afbe3630d9f21a765ca562b9f4e6563f3b522bfe86888d42aeb5d7c4e8d1c64310acccf6856676e635cce92ea242c0a6b0697108f2681a1caa33a364b23005ac20f32ae04af7e57092456512bb744aaddcbc6cfb93b924d095eead0bbe058969d640"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x3, 0x8001}]}}, {{0x9, 0x5, 0x0, 0x4, 0x3ff, 0x6, 0x1, 0xff, [@generic={0x31, 0x24, "f421d3d35748dccbcfda43aa3a8f0860a1aa51a2dc3ccbcdc9e800eb0624b0be188f1b3037ec8b4a8e512febdde11c"}]}}, {{0x9, 0x5, 0x9, 0x10, 0x44c, 0x81, 0x8, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xfc, 0x1}, @generic={0xde, 0x2f, "092caeb0108a3184a6168a36eaf452d75bdff776807bb7a70ae41e824272f29580b817874618e4392fac659c2d5c18f8255a00aa5528bccf9d27ff0524877f19807a1e9eb4173f86fc759098ce0a4bb7420e5f9b8338c5b56ac348553df30aefbf639c7e5257e635cc4a0a283ce3b42557e5365de92e82132b5b9e4ab3f5ac9e2235262535d8e8ba7b6d6301bca94b6c4f8ceba8369962bfc1be95053d2c9aba7367386a9c92e826d6a54cf3edff9abb0acbabc2db6548003cac4bf644304590d3f74cf38b51db4c38fdd0a5c42acc57dbb14bbb97f3cee13ce9db90"}]}}]}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x110, 0xb7, 0x8, 0xe0, 0x10, 0x9}, 0x5d, &(0x7f0000000340)={0x5, 0xf, 0x5d, 0x6, [@wireless={0xb, 0x10, 0x1, 0x2, 0x4, 0x1f, 0x1, 0x1, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "bb06cedd1b4e28ff4c1a21b2ce1e8892"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x9, 0x9, 0x1, 0x80}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0xa, 0xb, 0x1f}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "f6cac795c53a73ed6a93ea94bf96be2a"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "18b321f66d2fdfc4b1955ba406f93a82"}]}, 0x1, [{0xbd, &(0x7f00000003c0)=@string={0xbd, 0x3, "f342dee56c73e334ac155b8d1a9816b9ab6651172fa0470aea9399febc1eee2aae09949862c2a825e6246b98fa0e4512584891cce4e0f767848a82d2470be4fbd1ebc1cb5dc09d98580a582584baa75c156f72345ae5d5eabbef957bed4c7e6177b705e4faf688ac8b0acceff768cd2cdcf23e024d75043a297465687d82cbd67f4d3bf57d8b79c1d50a56fff74fdc1237579701b4d1f679129e55d7573be3d7c6b7123612e7732dd51b314b2eb612f7a53df55139610f93028f47"}}]}) syz_usb_disconnect(r1) getsockopt$MRT(r0, 0x0, 0xcf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x9, 0x20, 0x10, "210272cb635dcaffeeb6679d02e9ea99b5b0df2a89fffffffffffffffb0dee3e68f686391e2d5eebf58a18fcae1ea91ad44cc7af5ae033955c1ad11784240fb1", "a54164365100000800435981500000b91bfe62dcf1a701c7986bf133d4db87539b86094d2f2faa5800", "899402ba9dc4c7b342af83749819d201d80fb05e6117d7c7dfed0a6f3068cffb", [0xfffffffffffffffa, 0xa6e]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)={0x0, 0x0, 0x18}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'tunl0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x8000, 0xff, 0x1f, {{0x13, 0x4, 0x0, 0x35, 0x4c, 0x65, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@lsrr={0x83, 0xf, 0x59, [@rand_addr=0x64010101, @local, @private=0xa010102]}, @noop, @lsrr={0x83, 0x7, 0xd2, [@private=0xa010101]}, @timestamp_prespec={0x44, 0x14, 0xf1, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x400}]}, @timestamp={0x44, 0x8, 0x81, 0x0, 0x7, [0x3]}, @timestamp_addr={0x44, 0x4, 0x1, 0x1, 0x8}]}}}}}) syz_open_dev$loop(&(0x7f0000000100), 0x88d9, 0x40000) 00:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:19 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0xd, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:19 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, 0x0, 0x0) 00:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:19 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x1) 00:12:19 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) [ 739.939355][T23009] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 739.947334][T23009] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:12:19 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x1) 00:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:19 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="4cbee9d3abf05eaf41e5f9a638dfee5290cef46218d922fd6d91e63460a39b7f188f0c4613e8fee30cb12110c5d3291d2a0cdee8797d12624fea4d15f6d1"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0xfffffffffffffe4c, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:19 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x1) [ 740.166830][ T6056] usb 1-1: new high-speed USB device number 87 using dummy_hcd [ 740.347199][ T2151] ieee802154 phy0 wpan0: encryption failed: -22 [ 740.348610][ T2151] ieee802154 phy1 wpan1: encryption failed: -22 [ 740.416772][ T6056] usb 1-1: Using ep0 maxpacket: 16 [ 740.536778][ T6056] usb 1-1: config 5 has an invalid interface number: 93 but max is 2 [ 740.538382][ T6056] usb 1-1: config 5 has an invalid interface number: 212 but max is 2 [ 740.540134][ T6056] usb 1-1: config 5 has no interface number 1 [ 740.541393][ T6056] usb 1-1: config 5 has no interface number 2 [ 740.542619][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0xC has invalid maxpacket 1023, setting to 64 [ 740.544780][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0x2, skipping [ 740.552777][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0x7 has invalid maxpacket 512, setting to 64 [ 740.554920][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0xB, skipping [ 740.557117][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0x1 has invalid maxpacket 1024, setting to 64 [ 740.559295][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0x2, skipping [ 740.561335][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has an invalid endpoint with address 0x80, skipping [ 740.563453][ T6056] usb 1-1: config 5 interface 93 altsetting 7 endpoint 0xA has invalid maxpacket 511, setting to 64 [ 740.565654][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0xB, skipping [ 740.573677][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0x1, skipping [ 740.575875][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has an invalid endpoint with address 0x0, skipping [ 740.578123][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0x9, skipping [ 740.580174][ T6056] usb 1-1: config 5 interface 0 has no altsetting 0 [ 740.581465][ T6056] usb 1-1: config 5 interface 93 has no altsetting 0 [ 740.582838][ T6056] usb 1-1: config 5 interface 212 has no altsetting 0 [ 740.736780][ T6056] usb 1-1: Dual-Role OTG device on HNP port [ 740.756731][ T6056] usb 1-1: New USB device found, idVendor=187f, idProduct=0302, bcdDevice= 8.17 [ 740.758568][ T6056] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 740.760176][ T6056] usb 1-1: Product: syz [ 740.760998][ T6056] usb 1-1: Manufacturer: syz [ 740.761941][ T6056] usb 1-1: SerialNumber: syz [ 740.764576][ T6056] usb 1-1: Interface #212 referenced by multiple IADs [ 741.080316][ T6056] smsusb:smsusb_probe: board id=12, interface number 0 [ 741.256768][ T6056] ------------[ cut here ]------------ [ 741.257916][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 741.259670][ T6056] Modules linked in: [ 741.260439][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Not tainted 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 741.262335][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 741.264259][ T6056] Workqueue: usb_hub_wq hub_event [ 741.265300][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 741.266892][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 741.267947][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 741.268958][ T6056] sp : ffff800097356580 [ 741.269857][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 741.271469][ T6056] x26: 0000000000000001 x25: 1fffe0001f96981d x24: dfff800000000000 [ 741.273123][ T6056] x23: ffff700012e6acb0 x22: ffff0000fcb4c100 x21: ffff8000973565a0 [ 741.274859][ T6056] x20: 0000000000000001 x19: ffff0000fcb4c0e8 x18: 1fffe00036842bc6 [ 741.276572][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 741.278224][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 741.279813][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 741.281479][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 741.283162][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 741.284843][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 741.286429][ T6056] Call trace: [ 741.287075][ T6056] __flush_work+0x1b4/0x1c0 [ 741.288008][ T6056] __cancel_work_timer+0x3e4/0x540 [ 741.289051][ T6056] cancel_work_sync+0x24/0x38 [ 741.290034][ T6056] smsusb_term_device+0x98/0x1cc [ 741.291053][ T6056] smsusb_probe+0xcb8/0x1a0c [ 741.291994][ T6056] usb_probe_interface+0x500/0x984 [ 741.293082][ T6056] really_probe+0x394/0xa7c [ 741.293984][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.295063][ T6056] driver_probe_device+0x78/0x330 [ 741.296125][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.297196][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.298184][ T6056] __device_attach+0x2b4/0x434 [ 741.299199][ T6056] device_initial_probe+0x24/0x34 [ 741.300237][ T6056] bus_probe_device+0x178/0x240 [ 741.301180][ T6056] device_add+0xa44/0xdf0 [ 741.302016][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 741.303123][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 741.304194][ T6056] usb_probe_device+0x120/0x25c [ 741.305206][ T6056] really_probe+0x394/0xa7c [ 741.306100][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.307200][ T6056] driver_probe_device+0x78/0x330 [ 741.308246][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.309321][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.310336][ T6056] __device_attach+0x2b4/0x434 [ 741.311311][ T6056] device_initial_probe+0x24/0x34 [ 741.312341][ T6056] bus_probe_device+0x178/0x240 [ 741.313239][ T6056] device_add+0xa44/0xdf0 [ 741.314174][ T6056] usb_new_device+0x904/0x142c [ 741.315208][ T6056] hub_event+0x25e4/0x474c [ 741.316164][ T6056] process_one_work+0x788/0x12d4 [ 741.317168][ T6056] worker_thread+0x8e0/0xfe8 [ 741.318093][ T6056] kthread+0x288/0x310 [ 741.318982][ T6056] ret_from_fork+0x10/0x20 [ 741.319873][ T6056] irq event stamp: 2593688 [ 741.320808][ T6056] hardirqs last enabled at (2593687): [] __cancel_work_timer+0x3a4/0x540 [ 741.322897][ T6056] hardirqs last disabled at (2593688): [] el1_dbg+0x24/0x80 [ 741.324665][ T6056] softirqs last enabled at (2590734): [] __do_softirq+0xac0/0xd54 [ 741.326587][ T6056] softirqs last disabled at (2590195): [] ____do_softirq+0x14/0x20 [ 741.328542][ T6056] ---[ end trace 0000000000000000 ]--- [ 741.330812][ T6056] ------------[ cut here ]------------ [ 741.331922][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 741.333815][ T6056] Modules linked in: [ 741.334638][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 741.336827][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 741.338809][ T6056] Workqueue: usb_hub_wq hub_event [ 741.339864][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 741.341483][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 741.342425][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 741.343455][ T6056] sp : ffff800097356580 [ 741.344291][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 741.345919][ T6056] x26: 0000000000000001 x25: 1fffe0001f969841 x24: dfff800000000000 [ 741.347457][ T6056] x23: ffff700012e6acb0 x22: ffff0000fcb4c220 x21: ffff8000973565a0 [ 741.349158][ T6056] x20: 0000000000000001 x19: ffff0000fcb4c208 x18: 1fffe00036842bc6 [ 741.350834][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 741.352524][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 741.354123][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 741.355776][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 741.357443][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 741.359039][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 741.360722][ T6056] Call trace: [ 741.361399][ T6056] __flush_work+0x1b4/0x1c0 [ 741.362360][ T6056] __cancel_work_timer+0x3e4/0x540 [ 741.363448][ T6056] cancel_work_sync+0x24/0x38 [ 741.364421][ T6056] smsusb_term_device+0x98/0x1cc [ 741.365403][ T6056] smsusb_probe+0xcb8/0x1a0c [ 741.366320][ T6056] usb_probe_interface+0x500/0x984 [ 741.367354][ T6056] really_probe+0x394/0xa7c [ 741.368282][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.369351][ T6056] driver_probe_device+0x78/0x330 [ 741.370414][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.371530][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.372519][ T6056] __device_attach+0x2b4/0x434 [ 741.373472][ T6056] device_initial_probe+0x24/0x34 [ 741.374543][ T6056] bus_probe_device+0x178/0x240 [ 741.375476][ T6056] device_add+0xa44/0xdf0 [ 741.376437][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 741.377480][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 741.378584][ T6056] usb_probe_device+0x120/0x25c [ 741.379584][ T6056] really_probe+0x394/0xa7c [ 741.380514][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.381625][ T6056] driver_probe_device+0x78/0x330 [ 741.382625][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.383696][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.384668][ T6056] __device_attach+0x2b4/0x434 [ 741.385695][ T6056] device_initial_probe+0x24/0x34 [ 741.386669][ T6056] bus_probe_device+0x178/0x240 [ 741.387691][ T6056] device_add+0xa44/0xdf0 [ 741.388584][ T6056] usb_new_device+0x904/0x142c [ 741.389592][ T6056] hub_event+0x25e4/0x474c [ 741.390464][ T6056] process_one_work+0x788/0x12d4 [ 741.391581][ T6056] worker_thread+0x8e0/0xfe8 [ 741.392631][ T6056] kthread+0x288/0x310 [ 741.393476][ T6056] ret_from_fork+0x10/0x20 [ 741.394397][ T6056] irq event stamp: 2594100 [ 741.395351][ T6056] hardirqs last enabled at (2594099): [] __cancel_work_timer+0x3a4/0x540 [ 741.397499][ T6056] hardirqs last disabled at (2594100): [] el1_dbg+0x24/0x80 [ 741.399349][ T6056] softirqs last enabled at (2594092): [] __do_softirq+0xac0/0xd54 [ 741.401294][ T6056] softirqs last disabled at (2593691): [] ____do_softirq+0x14/0x20 [ 741.403261][ T6056] ---[ end trace 0000000000000000 ]--- [ 741.405522][ T6056] ------------[ cut here ]------------ [ 741.406654][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 741.408469][ T6056] Modules linked in: [ 741.409325][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 741.411579][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 741.413709][ T6056] Workqueue: usb_hub_wq hub_event [ 741.414769][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 741.416317][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 741.417391][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 741.418395][ T6056] sp : ffff800097356580 [ 741.419233][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 741.420940][ T6056] x26: 0000000000000001 x25: 1fffe0001f969865 x24: dfff800000000000 [ 741.422642][ T6056] x23: ffff700012e6acb0 x22: ffff0000fcb4c340 x21: ffff8000973565a0 [ 741.424326][ T6056] x20: 0000000000000001 x19: ffff0000fcb4c328 x18: 1fffe00036842bc6 [ 741.426070][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 741.427699][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 741.429405][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 741.431060][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 741.432750][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 741.434425][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 741.436102][ T6056] Call trace: [ 741.436853][ T6056] __flush_work+0x1b4/0x1c0 [ 741.437776][ T6056] __cancel_work_timer+0x3e4/0x540 [ 741.438835][ T6056] cancel_work_sync+0x24/0x38 [ 741.439742][ T6056] smsusb_term_device+0x98/0x1cc [ 741.440768][ T6056] smsusb_probe+0xcb8/0x1a0c [ 741.441669][ T6056] usb_probe_interface+0x500/0x984 [ 741.442737][ T6056] really_probe+0x394/0xa7c [ 741.443625][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.444707][ T6056] driver_probe_device+0x78/0x330 [ 741.445807][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.446837][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.447813][ T6056] __device_attach+0x2b4/0x434 [ 741.448789][ T6056] device_initial_probe+0x24/0x34 [ 741.449794][ T6056] bus_probe_device+0x178/0x240 [ 741.450867][ T6056] device_add+0xa44/0xdf0 [ 741.451702][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 741.452810][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 741.454015][ T6056] usb_probe_device+0x120/0x25c [ 741.455024][ T6056] really_probe+0x394/0xa7c [ 741.455937][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.457065][ T6056] driver_probe_device+0x78/0x330 [ 741.458157][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.459335][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.460283][ T6056] __device_attach+0x2b4/0x434 [ 741.461241][ T6056] device_initial_probe+0x24/0x34 [ 741.462274][ T6056] bus_probe_device+0x178/0x240 [ 741.463302][ T6056] device_add+0xa44/0xdf0 [ 741.464220][ T6056] usb_new_device+0x904/0x142c [ 741.465220][ T6056] hub_event+0x25e4/0x474c [ 741.466071][ T6056] process_one_work+0x788/0x12d4 [ 741.467094][ T6056] worker_thread+0x8e0/0xfe8 [ 741.467996][ T6056] kthread+0x288/0x310 [ 741.468784][ T6056] ret_from_fork+0x10/0x20 [ 741.469700][ T6056] irq event stamp: 2594786 [ 741.470611][ T6056] hardirqs last enabled at (2594785): [] __cancel_work_timer+0x3a4/0x540 [ 741.472752][ T6056] hardirqs last disabled at (2594786): [] el1_dbg+0x24/0x80 [ 741.474530][ T6056] softirqs last enabled at (2594782): [] __do_softirq+0xac0/0xd54 [ 741.476523][ T6056] softirqs last disabled at (2594103): [] ____do_softirq+0x14/0x20 [ 741.478417][ T6056] ---[ end trace 0000000000000000 ]--- [ 741.479889][ T6056] ------------[ cut here ]------------ [ 741.481008][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 741.482802][ T6056] Modules linked in: [ 741.483595][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 741.485815][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 741.487836][ T6056] Workqueue: usb_hub_wq hub_event [ 741.488887][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 741.490459][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 741.491546][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 741.492539][ T6056] sp : ffff800097356580 [ 741.493329][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 741.495000][ T6056] x26: 0000000000000001 x25: 1fffe0001f969889 x24: dfff800000000000 [ 741.496725][ T6056] x23: ffff700012e6acb0 x22: ffff0000fcb4c460 x21: ffff8000973565a0 [ 741.498371][ T6056] x20: 0000000000000001 x19: ffff0000fcb4c448 x18: 1fffe00036842bc6 [ 741.500098][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 741.501732][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 741.503409][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 741.505049][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 741.506721][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 741.508378][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 741.509985][ T6056] Call trace: [ 741.510630][ T6056] __flush_work+0x1b4/0x1c0 [ 741.511497][ T6056] __cancel_work_timer+0x3e4/0x540 [ 741.512531][ T6056] cancel_work_sync+0x24/0x38 [ 741.513517][ T6056] smsusb_term_device+0x98/0x1cc [ 741.514517][ T6056] smsusb_probe+0xcb8/0x1a0c [ 741.515453][ T6056] usb_probe_interface+0x500/0x984 [ 741.516484][ T6056] really_probe+0x394/0xa7c [ 741.517424][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.518477][ T6056] driver_probe_device+0x78/0x330 [ 741.519538][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.520668][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.521638][ T6056] __device_attach+0x2b4/0x434 [ 741.522606][ T6056] device_initial_probe+0x24/0x34 [ 741.523645][ T6056] bus_probe_device+0x178/0x240 [ 741.524581][ T6056] device_add+0xa44/0xdf0 [ 741.525470][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 741.526633][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 741.527692][ T6056] usb_probe_device+0x120/0x25c [ 741.528727][ T6056] really_probe+0x394/0xa7c [ 741.529606][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.530702][ T6056] driver_probe_device+0x78/0x330 [ 741.531672][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.532744][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.533810][ T6056] __device_attach+0x2b4/0x434 [ 741.534810][ T6056] device_initial_probe+0x24/0x34 [ 741.535893][ T6056] bus_probe_device+0x178/0x240 [ 741.536890][ T6056] device_add+0xa44/0xdf0 [ 741.537727][ T6056] usb_new_device+0x904/0x142c [ 741.538694][ T6056] hub_event+0x25e4/0x474c [ 741.539588][ T6056] process_one_work+0x788/0x12d4 [ 741.540617][ T6056] worker_thread+0x8e0/0xfe8 [ 741.541561][ T6056] kthread+0x288/0x310 [ 741.542389][ T6056] ret_from_fork+0x10/0x20 [ 741.543260][ T6056] irq event stamp: 2594842 [ 741.544168][ T6056] hardirqs last enabled at (2594841): [] __cancel_work_timer+0x3a4/0x540 [ 741.546228][ T6056] hardirqs last disabled at (2594842): [] el1_dbg+0x24/0x80 [ 741.547970][ T6056] softirqs last enabled at (2594834): [] __do_softirq+0xac0/0xd54 [ 741.549807][ T6056] softirqs last disabled at (2594789): [] ____do_softirq+0x14/0x20 [ 741.551622][ T6056] ---[ end trace 0000000000000000 ]--- [ 741.553928][ T6056] ------------[ cut here ]------------ [ 741.554968][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 741.556690][ T6056] Modules linked in: [ 741.557471][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 741.559700][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 741.561755][ T6056] Workqueue: usb_hub_wq hub_event [ 741.562805][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 741.564396][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 741.565422][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 741.566429][ T6056] sp : ffff800097356580 [ 741.567259][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 741.568976][ T6056] x26: 0000000000000001 x25: 1fffe0001f9698ad x24: dfff800000000000 [ 741.570588][ T6056] x23: ffff700012e6acb0 x22: ffff0000fcb4c580 x21: ffff8000973565a0 [ 741.572213][ T6056] x20: 0000000000000001 x19: ffff0000fcb4c568 x18: 1fffe00036842bc6 [ 741.573880][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 741.575515][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 741.577128][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 741.578797][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 741.580428][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 741.582097][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 741.583700][ T6056] Call trace: [ 741.584381][ T6056] __flush_work+0x1b4/0x1c0 [ 741.585287][ T6056] __cancel_work_timer+0x3e4/0x540 [ 741.586355][ T6056] cancel_work_sync+0x24/0x38 [ 741.587287][ T6056] smsusb_term_device+0x98/0x1cc [ 741.588290][ T6056] smsusb_probe+0xcb8/0x1a0c [ 741.589301][ T6056] usb_probe_interface+0x500/0x984 [ 741.590322][ T6056] really_probe+0x394/0xa7c [ 741.591223][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.592256][ T6056] driver_probe_device+0x78/0x330 [ 741.593251][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.594381][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.595413][ T6056] __device_attach+0x2b4/0x434 [ 741.596363][ T6056] device_initial_probe+0x24/0x34 [ 741.597381][ T6056] bus_probe_device+0x178/0x240 [ 741.598392][ T6056] device_add+0xa44/0xdf0 [ 741.599327][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 741.600407][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 741.601513][ T6056] usb_probe_device+0x120/0x25c [ 741.602458][ T6056] really_probe+0x394/0xa7c [ 741.603390][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.604469][ T6056] driver_probe_device+0x78/0x330 [ 741.605498][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.606528][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.607499][ T6056] __device_attach+0x2b4/0x434 [ 741.608464][ T6056] device_initial_probe+0x24/0x34 [ 741.609479][ T6056] bus_probe_device+0x178/0x240 [ 741.610473][ T6056] device_add+0xa44/0xdf0 [ 741.611370][ T6056] usb_new_device+0x904/0x142c [ 741.612384][ T6056] hub_event+0x25e4/0x474c [ 741.613262][ T6056] process_one_work+0x788/0x12d4 [ 741.614273][ T6056] worker_thread+0x8e0/0xfe8 [ 741.615160][ T6056] kthread+0x288/0x310 [ 741.615962][ T6056] ret_from_fork+0x10/0x20 [ 741.616858][ T6056] irq event stamp: 2595232 [ 741.617725][ T6056] hardirqs last enabled at (2595231): [] __cancel_work_timer+0x3a4/0x540 [ 741.619733][ T6056] hardirqs last disabled at (2595232): [] el1_dbg+0x24/0x80 [ 741.621558][ T6056] softirqs last enabled at (2595224): [] __do_softirq+0xac0/0xd54 [ 741.623515][ T6056] softirqs last disabled at (2594845): [] ____do_softirq+0x14/0x20 [ 741.625488][ T6056] ---[ end trace 0000000000000000 ]--- [ 741.627798][ T6056] ------------[ cut here ]------------ [ 741.628885][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 741.630740][ T6056] Modules linked in: [ 741.631583][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 741.633829][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 741.635886][ T6056] Workqueue: usb_hub_wq hub_event [ 741.636879][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 741.638547][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 741.639557][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 741.640572][ T6056] sp : ffff800097356580 [ 741.641470][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 741.643092][ T6056] x26: 0000000000000001 x25: 1fffe0001f9698d1 x24: dfff800000000000 [ 741.644761][ T6056] x23: ffff700012e6acb0 x22: ffff0000fcb4c6a0 x21: ffff8000973565a0 [ 741.646403][ T6056] x20: 0000000000000001 x19: ffff0000fcb4c688 x18: 1fffe00036842bc6 [ 741.648065][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 741.649720][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 741.651325][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 741.652990][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 741.654627][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 741.656270][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 741.657901][ T6056] Call trace: [ 741.658647][ T6056] __flush_work+0x1b4/0x1c0 [ 741.659572][ T6056] __cancel_work_timer+0x3e4/0x540 [ 741.660608][ T6056] cancel_work_sync+0x24/0x38 [ 741.661596][ T6056] smsusb_term_device+0x98/0x1cc [ 741.662618][ T6056] smsusb_probe+0xcb8/0x1a0c [ 741.663539][ T6056] usb_probe_interface+0x500/0x984 [ 741.664546][ T6056] really_probe+0x394/0xa7c [ 741.665435][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.666520][ T6056] driver_probe_device+0x78/0x330 [ 741.667536][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.668648][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.669691][ T6056] __device_attach+0x2b4/0x434 [ 741.670638][ T6056] device_initial_probe+0x24/0x34 [ 741.671717][ T6056] bus_probe_device+0x178/0x240 [ 741.672691][ T6056] device_add+0xa44/0xdf0 [ 741.673539][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 741.674663][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 741.675844][ T6056] usb_probe_device+0x120/0x25c [ 741.676896][ T6056] really_probe+0x394/0xa7c [ 741.677834][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.678883][ T6056] driver_probe_device+0x78/0x330 [ 741.679941][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.681046][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.682088][ T6056] __device_attach+0x2b4/0x434 [ 741.683068][ T6056] device_initial_probe+0x24/0x34 [ 741.684115][ T6056] bus_probe_device+0x178/0x240 [ 741.685185][ T6056] device_add+0xa44/0xdf0 [ 741.686186][ T6056] usb_new_device+0x904/0x142c [ 741.687164][ T6056] hub_event+0x25e4/0x474c [ 741.687995][ T6056] process_one_work+0x788/0x12d4 [ 741.688984][ T6056] worker_thread+0x8e0/0xfe8 [ 741.689922][ T6056] kthread+0x288/0x310 [ 741.690759][ T6056] ret_from_fork+0x10/0x20 [ 741.691729][ T6056] irq event stamp: 2595684 [ 741.692596][ T6056] hardirqs last enabled at (2595683): [] __cancel_work_timer+0x3a4/0x540 [ 741.694626][ T6056] hardirqs last disabled at (2595684): [] el1_dbg+0x24/0x80 [ 741.696393][ T6056] softirqs last enabled at (2595676): [] __do_softirq+0xac0/0xd54 [ 741.698305][ T6056] softirqs last disabled at (2595235): [] ____do_softirq+0x14/0x20 [ 741.700225][ T6056] ---[ end trace 0000000000000000 ]--- [ 741.701537][ T6056] ------------[ cut here ]------------ [ 741.702639][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 741.704399][ T6056] Modules linked in: [ 741.705183][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 741.707333][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 741.709413][ T6056] Workqueue: usb_hub_wq hub_event [ 741.710397][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 741.711986][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 741.712969][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 741.713923][ T6056] sp : ffff800097356580 [ 741.714750][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 741.716455][ T6056] x26: 0000000000000001 x25: 1fffe0001f9698f5 x24: dfff800000000000 [ 741.718139][ T6056] x23: ffff700012e6acb0 x22: ffff0000fcb4c7c0 x21: ffff8000973565a0 [ 741.719763][ T6056] x20: 0000000000000001 x19: ffff0000fcb4c7a8 x18: 1fffe00036842bc6 [ 741.721420][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 741.723087][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 741.724753][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 741.726393][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 741.728027][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 741.729679][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 741.731290][ T6056] Call trace: [ 741.731968][ T6056] __flush_work+0x1b4/0x1c0 [ 741.732833][ T6056] __cancel_work_timer+0x3e4/0x540 [ 741.733875][ T6056] cancel_work_sync+0x24/0x38 [ 741.734863][ T6056] smsusb_term_device+0x98/0x1cc [ 741.735872][ T6056] smsusb_probe+0xcb8/0x1a0c [ 741.736745][ T6056] usb_probe_interface+0x500/0x984 [ 741.737809][ T6056] really_probe+0x394/0xa7c [ 741.738743][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.739763][ T6056] driver_probe_device+0x78/0x330 [ 741.740852][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.741980][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.743074][ T6056] __device_attach+0x2b4/0x434 [ 741.744014][ T6056] device_initial_probe+0x24/0x34 [ 741.745076][ T6056] bus_probe_device+0x178/0x240 [ 741.746042][ T6056] device_add+0xa44/0xdf0 [ 741.746886][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 741.748020][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 741.749078][ T6056] usb_probe_device+0x120/0x25c [ 741.750102][ T6056] really_probe+0x394/0xa7c [ 741.751075][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.752105][ T6056] driver_probe_device+0x78/0x330 [ 741.753102][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.754137][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.755134][ T6056] __device_attach+0x2b4/0x434 [ 741.756116][ T6056] device_initial_probe+0x24/0x34 [ 741.757107][ T6056] bus_probe_device+0x178/0x240 [ 741.758111][ T6056] device_add+0xa44/0xdf0 [ 741.758977][ T6056] usb_new_device+0x904/0x142c [ 741.759945][ T6056] hub_event+0x25e4/0x474c [ 741.760880][ T6056] process_one_work+0x788/0x12d4 [ 741.761971][ T6056] worker_thread+0x8e0/0xfe8 [ 741.762933][ T6056] kthread+0x288/0x310 [ 741.763812][ T6056] ret_from_fork+0x10/0x20 [ 741.764660][ T6056] irq event stamp: 2595712 [ 741.765584][ T6056] hardirqs last enabled at (2595711): [] __cancel_work_timer+0x3a4/0x540 [ 741.767672][ T6056] hardirqs last disabled at (2595712): [] el1_dbg+0x24/0x80 [ 741.769543][ T6056] softirqs last enabled at (2595708): [] __do_softirq+0xac0/0xd54 [ 741.771410][ T6056] softirqs last disabled at (2595687): [] ____do_softirq+0x14/0x20 [ 741.773399][ T6056] ---[ end trace 0000000000000000 ]--- [ 741.775669][ T6056] ------------[ cut here ]------------ [ 741.776759][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 741.778615][ T6056] Modules linked in: [ 741.779395][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 741.781700][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 741.783712][ T6056] Workqueue: usb_hub_wq hub_event [ 741.784747][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 741.786421][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 741.787425][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 741.788397][ T6056] sp : ffff800097356580 [ 741.789316][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 741.790966][ T6056] x26: 0000000000000001 x25: 1fffe0001f969919 x24: dfff800000000000 [ 741.792599][ T6056] x23: ffff700012e6acb0 x22: ffff0000fcb4c8e0 x21: ffff8000973565a0 [ 741.794163][ T6056] x20: 0000000000000001 x19: ffff0000fcb4c8c8 x18: 1fffe00036842bc6 [ 741.795800][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 741.797539][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 741.799231][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 741.800867][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 741.802500][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 741.804138][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 741.805782][ T6056] Call trace: [ 741.806464][ T6056] __flush_work+0x1b4/0x1c0 [ 741.807438][ T6056] __cancel_work_timer+0x3e4/0x540 [ 741.808471][ T6056] cancel_work_sync+0x24/0x38 [ 741.809442][ T6056] smsusb_term_device+0x98/0x1cc [ 741.810448][ T6056] smsusb_probe+0xcb8/0x1a0c [ 741.811431][ T6056] usb_probe_interface+0x500/0x984 [ 741.812475][ T6056] really_probe+0x394/0xa7c [ 741.813414][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.814489][ T6056] driver_probe_device+0x78/0x330 [ 741.815513][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.816688][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.817642][ T6056] __device_attach+0x2b4/0x434 [ 741.818606][ T6056] device_initial_probe+0x24/0x34 [ 741.819663][ T6056] bus_probe_device+0x178/0x240 [ 741.820680][ T6056] device_add+0xa44/0xdf0 [ 741.821554][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 741.822687][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 741.823813][ T6056] usb_probe_device+0x120/0x25c [ 741.824890][ T6056] really_probe+0x394/0xa7c [ 741.825806][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.826931][ T6056] driver_probe_device+0x78/0x330 [ 741.827966][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.829098][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.830126][ T6056] __device_attach+0x2b4/0x434 [ 741.831104][ T6056] device_initial_probe+0x24/0x34 [ 741.832119][ T6056] bus_probe_device+0x178/0x240 [ 741.833095][ T6056] device_add+0xa44/0xdf0 [ 741.834043][ T6056] usb_new_device+0x904/0x142c [ 741.835050][ T6056] hub_event+0x25e4/0x474c [ 741.836016][ T6056] process_one_work+0x788/0x12d4 [ 741.837069][ T6056] worker_thread+0x8e0/0xfe8 [ 741.837983][ T6056] kthread+0x288/0x310 [ 741.838780][ T6056] ret_from_fork+0x10/0x20 [ 741.839745][ T6056] irq event stamp: 2596134 [ 741.840635][ T6056] hardirqs last enabled at (2596133): [] __cancel_work_timer+0x3a4/0x540 [ 741.842675][ T6056] hardirqs last disabled at (2596134): [] el1_dbg+0x24/0x80 [ 741.844473][ T6056] softirqs last enabled at (2596126): [] __do_softirq+0xac0/0xd54 [ 741.846398][ T6056] softirqs last disabled at (2595715): [] ____do_softirq+0x14/0x20 [ 741.848410][ T6056] ---[ end trace 0000000000000000 ]--- [ 741.850630][ T6056] ------------[ cut here ]------------ [ 741.851698][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 741.853566][ T6056] Modules linked in: [ 741.854299][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 741.856517][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 741.858600][ T6056] Workqueue: usb_hub_wq hub_event [ 741.859556][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 741.861214][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 741.862275][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 741.863249][ T6056] sp : ffff800097356580 [ 741.864114][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 741.865726][ T6056] x26: 0000000000000001 x25: 1fffe0001f96993d x24: dfff800000000000 [ 741.867288][ T6056] x23: ffff700012e6acb0 x22: ffff0000fcb4ca00 x21: ffff8000973565a0 [ 741.868920][ T6056] x20: 0000000000000001 x19: ffff0000fcb4c9e8 x18: 1fffe00036842bc6 [ 741.870592][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 741.872263][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 741.873878][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 741.875539][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 741.877136][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 741.878780][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 741.880403][ T6056] Call trace: [ 741.881082][ T6056] __flush_work+0x1b4/0x1c0 [ 741.882008][ T6056] __cancel_work_timer+0x3e4/0x540 [ 741.883118][ T6056] cancel_work_sync+0x24/0x38 [ 741.884017][ T6056] smsusb_term_device+0x98/0x1cc [ 741.884983][ T6056] smsusb_probe+0xcb8/0x1a0c [ 741.885999][ T6056] usb_probe_interface+0x500/0x984 [ 741.887046][ T6056] really_probe+0x394/0xa7c [ 741.888013][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.889093][ T6056] driver_probe_device+0x78/0x330 [ 741.890136][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.891228][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.892223][ T6056] __device_attach+0x2b4/0x434 [ 741.893178][ T6056] device_initial_probe+0x24/0x34 [ 741.894173][ T6056] bus_probe_device+0x178/0x240 [ 741.895123][ T6056] device_add+0xa44/0xdf0 [ 741.896177][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 741.897254][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 741.898315][ T6056] usb_probe_device+0x120/0x25c [ 741.899287][ T6056] really_probe+0x394/0xa7c [ 741.900192][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.901263][ T6056] driver_probe_device+0x78/0x330 [ 741.902249][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.903277][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.904251][ T6056] __device_attach+0x2b4/0x434 [ 741.905207][ T6056] device_initial_probe+0x24/0x34 [ 741.906273][ T6056] bus_probe_device+0x178/0x240 [ 741.907289][ T6056] device_add+0xa44/0xdf0 [ 741.908232][ T6056] usb_new_device+0x904/0x142c [ 741.909190][ T6056] hub_event+0x25e4/0x474c [ 741.910075][ T6056] process_one_work+0x788/0x12d4 [ 741.911125][ T6056] worker_thread+0x8e0/0xfe8 [ 741.912043][ T6056] kthread+0x288/0x310 [ 741.912878][ T6056] ret_from_fork+0x10/0x20 [ 741.913770][ T6056] irq event stamp: 2596784 [ 741.914669][ T6056] hardirqs last enabled at (2596783): [] __cancel_work_timer+0x3a4/0x540 [ 741.916632][ T6056] hardirqs last disabled at (2596784): [] el1_dbg+0x24/0x80 [ 741.918520][ T6056] softirqs last enabled at (2596780): [] __do_softirq+0xac0/0xd54 [ 741.920381][ T6056] softirqs last disabled at (2596137): [] ____do_softirq+0x14/0x20 [ 741.922366][ T6056] ---[ end trace 0000000000000000 ]--- [ 741.929235][ T6056] ------------[ cut here ]------------ [ 741.930297][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 741.932147][ T6056] Modules linked in: [ 741.932949][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 741.935192][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 741.937158][ T6056] Workqueue: usb_hub_wq hub_event [ 741.938231][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 741.939846][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 741.940878][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 741.941896][ T6056] sp : ffff800097356580 [ 741.942738][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 741.944419][ T6056] x26: 0000000000000001 x25: 1fffe0001f969961 x24: dfff800000000000 [ 741.946128][ T6056] x23: ffff700012e6acb0 x22: ffff0000fcb4cb20 x21: ffff8000973565a0 [ 741.947861][ T6056] x20: 0000000000000001 x19: ffff0000fcb4cb08 x18: 1fffe00036842bc6 [ 741.949527][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 741.951114][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 741.952737][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 741.954484][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 741.956221][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 741.957899][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 741.959527][ T6056] Call trace: [ 741.960180][ T6056] __flush_work+0x1b4/0x1c0 [ 741.961070][ T6056] __cancel_work_timer+0x3e4/0x540 [ 741.962144][ T6056] cancel_work_sync+0x24/0x38 [ 741.963079][ T6056] smsusb_term_device+0x98/0x1cc [ 741.964088][ T6056] smsusb_probe+0xcb8/0x1a0c [ 741.965047][ T6056] usb_probe_interface+0x500/0x984 [ 741.966142][ T6056] really_probe+0x394/0xa7c [ 741.967080][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.968192][ T6056] driver_probe_device+0x78/0x330 [ 741.969251][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.970397][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.971383][ T6056] __device_attach+0x2b4/0x434 [ 741.972382][ T6056] device_initial_probe+0x24/0x34 [ 741.973531][ T6056] bus_probe_device+0x178/0x240 [ 741.974547][ T6056] device_add+0xa44/0xdf0 [ 741.975404][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 741.976559][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 741.977687][ T6056] usb_probe_device+0x120/0x25c [ 741.978718][ T6056] really_probe+0x394/0xa7c [ 741.979661][ T6056] __driver_probe_device+0x194/0x3b4 [ 741.980820][ T6056] driver_probe_device+0x78/0x330 [ 741.981865][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 741.982933][ T6056] bus_for_each_drv+0x228/0x2bc [ 741.983894][ T6056] __device_attach+0x2b4/0x434 [ 741.984912][ T6056] device_initial_probe+0x24/0x34 [ 741.985958][ T6056] bus_probe_device+0x178/0x240 [ 741.986963][ T6056] device_add+0xa44/0xdf0 [ 741.987912][ T6056] usb_new_device+0x904/0x142c [ 741.988880][ T6056] hub_event+0x25e4/0x474c [ 741.989773][ T6056] process_one_work+0x788/0x12d4 [ 741.990755][ T6056] worker_thread+0x8e0/0xfe8 [ 741.991713][ T6056] kthread+0x288/0x310 [ 741.992607][ T6056] ret_from_fork+0x10/0x20 [ 741.993561][ T6056] irq event stamp: 2597196 00:12:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) r1 = syz_usb_connect(0x3, 0xc09, &(0x7f0000000b40)={{0x12, 0x1, 0x110, 0x6d, 0x9b, 0xc0, 0x10, 0x187f, 0x302, 0x817, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xbf7, 0x3, 0x5, 0xe1, 0x90, 0x5, [{{0x9, 0x4, 0x0, 0x5, 0xd, 0xb6, 0x6b, 0x54, 0x13, [@generic={0xe2, 0x23, "7a135dc100e8e7cc0545b933efe6186650fa4d6ff8ff9fc6d10c134a23bfbb74887d4aa605f5c5d4830b8e73d1077874aa7f91199d1556a5ed06dcde8c52af76321c341be3d7f1191b9ae487d9bedc3c24ee98fff2cbcfdc58240ece44e8b1460632e4385af1ec2e0fde5bae7172a44c018cf0ea7e1b37814f0b6fd97021b0c20f4e0cd845f7a1a64a146e7c35e6bf2ea0b26297cedeabe910d0fce966ac5ad60179ef7591dc8a65ab0f543e997d4eab639c302a73287b25af116698ffe04f1badac7fbf39321b595db550da19b44380cc29ccabe8229201c7341b8fee337e4d"}], [{{0x9, 0x5, 0x3, 0x0, 0x20, 0xff, 0x92, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xad, 0x1}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x0, 0x9}]}}, {{0x9, 0x5, 0x6, 0x1, 0x200, 0x9, 0x0, 0x9, [@generic={0x8b, 0xa, "9d57533c1ba63b12a5ff9df5b4b9750ed4eef8ce0d29cb07bdafc6a6fedb6d77d5e1e88fa00238f71708e72c3ae09b23573789cb02e3586b68def0ca1cb058469af9216d4af47f8d1e751312387dd73ac2b604640f37c7a97ab70efdcebd398796a8da1f73a489b754e83716d744d13150c8a14c0f7ec50644ac0c4705d6d3df4b66262168cd15cee4"}]}}, {{0x9, 0x5, 0xc, 0x0, 0x3ff, 0x0, 0x3, 0xc, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x5, 0x3}]}}, {{0x9, 0x5, 0x2, 0x4, 0x28, 0x0, 0x40, 0x40, [@generic={0x2d, 0x31, "4b019e17c14610a75bba08075ba34f680fa01804b12180ea718c3d6ca26ca189829eff3cbb86c68858f8ae"}, @generic={0xb3, 0xb, "8c7b81e6fbeba6e961044b82ca11b41e3ed227e77801e489384134008c874cb5e1e3374b3cce73b8feaa6fe2188c1140e3ee90a1e608079eb6ab1569ace1d4a8fb2cde9b9535081b7e6c753079a2d2046e98274f410ac0e9520f1fcdd2df89a3adee4fea425b814de64f097f7765b2481b9ae6a5ad330f60039736d04df527a5b36143d7c1b8c747d8078a2435e2abaaa47f2cfa88bace765beec113e192b7014f8e0c24ba9e9f647a5c399d92757b1e72"}]}}, {{0x9, 0x5, 0xb, 0x10, 0x8, 0x4, 0x0, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x9}]}}, {{0x9, 0x5, 0x2, 0x10, 0x20, 0x20, 0x0, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x5, 0x3}]}}, {{0x9, 0x5, 0x7, 0x4, 0x200, 0x4, 0x8, 0x9, [@generic={0xe0, 0x10, "07f49d639f75d400d6abe0771d265ca87ba6d6995670761d98bb81a56c47828afe3e4f344aa778938ceb36678b36b0cf53bf5e4696853b7def97dacf969eec79c580987120676338746f3a5fe04b04042573709aca6e6993e7bb7c9042781e19c282e9515d4a505c1b86dab3c7578d9eff062562eb7020c5c0cd47720881fce52bf447db4ec6d4485c4b03deb6350d2f65c95fea9fbc12a8934aa434596dcaae56712fb690a17d68e71d2ac377fab9f7717ea5dbbc0a0dbf48c859b30f658323c572f507e020973f10c070b4aa0ba9cb1e0dce42e014c5e5cdcac2004cc7"}]}}, {{0x9, 0x5, 0xb, 0x8, 0x10, 0x3f, 0x7, 0x81, [@generic={0xdd, 0x24, "9bfde775d18e5240467003251666c37b63ecf76d83b51941878dcae90135f728bd954117607e9d0703707efca1c8d16536ac4b8b02ccce1f36f4128365b037f7a98365f8f37c9907bde723b02d5db3113a58296f01ef1f85a30bc11facff51510c2f007784115330ad0ae44a22885aa93892680b3aae2aa5a886a7e1314bed5610a447f26eab10d7c7ea6e344501c5daec8882d6354bf482d32bac5cb2e3c60d36ab58845a819ad5c9693b197553d69e293f4b6ff3c4d5de3ea409b2bb46008aca955aa97239a502f74684e1a196ef75132780bbaeec91f60ff9b0"}]}}, {{0x9, 0x5, 0x5, 0x0, 0x10, 0x20, 0x80, 0x3, [@generic={0xd9, 0xb, "aca4fa4252d9ed94294cf72d77e1acb265500fc4cfda6409078e8d237d15fba5e6301f3ac2835dc96ba8147ce6f2333e065bb99f211b00d266aa790b2c82fe9be07397447db4411aa1d7b0b7b436cc4a6d911787a8c8217f8844ff4db722fa17b0b02d2a45add096a2ca67699b53d6eba77da61d104092f89df48c6f4960d78ef3e00afc9726e49231de367635f0aa33ed95dfc5e10685e06d65d7e7f9c69a37fb54ebbb4aa48653621e2fb082255461d7a514eb6b16fd2b17418755dbf73c27fb7390a88a799f89a69632a7b1c26c62763ab6206a4080"}]}}, {{0x9, 0x5, 0x1, 0x10, 0x400, 0x6, 0x1f, 0x1, [@generic={0xa7, 0x21, "14811a29c5ae1d9910c328e6c77cb2b6d3d558f684f1a8b7b1ba8b1a33a0a48fcf1bf2e9d7b39385e84fd58f4a18b3123759428be33d86fbf505088d455d16326a64df0419df3c331b93f7b85a30ed125322b01eaa450db7698a44cc0a05cf33198561962968485406e815fb0868f08c6a16b37a9d5e03a81eb0df5fee57246db3689f927b9380e894069cad4796691cf02e381ac60e3b3f6b0cc865461b8644619b276ce8"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x5, 0x1000}]}}, {{0x9, 0x5, 0x9, 0x4, 0x40, 0x8, 0x22, 0x1f, [@generic={0xa6, 0xc, "f39e187d06bd2c24cb7a17470178ae886bd270ca5246b031140c7dc39b59a1b8c49fb3f9312b9df72a79096f9a017d89d5f0c7eeee68090487fec50521bb698e1c59814f87036124f3301d2ae6297071b1e25feada1341973b66865a11648613bcdebe40c78646de0604f93ca6e8f621fad79012739775e530b1f3174accf9cb00c70957ea07f9bb6431603351c76190670d498fb95818d6c37a040ff67db0e82baf2083"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x408, 0x8, 0x5, 0x8, [@generic={0x66, 0x31, "c48884bd4e099a7a00cdf4c68eda2f87bf1edd37f52cd990b7e59fc26bd60ab5c59455c46016f13b47502646c4ad549dd20613e6830d2b505a85add960a74e06096b1e3e01fad59a60e0e2ca0a23dd19008a9e4616080e28a420b1215659801217c3627e"}]}}, {{0x9, 0x5, 0x80, 0x8, 0x3ff, 0x0, 0x42, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x8, 0x5}, @generic={0xc0, 0x23, "bb6a114ac086aeab845a9dcbf82da6ce1da151c285b8b20f9cc185d697d205c321e2537a3ec0dc14a1a8ed660d92b8222ed6f2730feca67f8327eb6d799a3e8d6a9dca9e74b20eb60bcd7f6d7cce6dc09405d83c5b7cc35eeb5dc8b5cb0f4f1b0cbc5cacfb5c00a9ecb6f032a4cbea22f2dd9148c49dc831a26d2d6889d2253ba72f2d6dab1b3f06723e92da2126200190f1a3f0d1c400d3c1d0297c3757ce9488e1ec1a3df18958a1bac48938932215c3dda45526da9990e22cac6400c4"}]}}]}}, {{0x9, 0x4, 0x5d, 0x7, 0x2, 0xff, 0x4, 0x6a, 0x0, [@cdc_ncm={{0x9, 0x24, 0x6, 0x0, 0x1, "1c3ecb34"}, {0x5, 0x24, 0x0, 0xc3}, {0xd, 0x24, 0xf, 0x1, 0x3, 0x7fff, 0x80, 0x6}, {0x6, 0x24, 0x1a, 0xfff, 0x9}, [@mdlm={0x15, 0x24, 0x12, 0x1}, @mdlm={0x15, 0x24, 0x12, 0x4}]}, @hid_hid={0x9, 0x21, 0x3ff, 0xa8, 0x1, {0x22, 0x8e1}}], [{{0x9, 0x5, 0xa, 0x0, 0x1ff, 0x8, 0x9, 0x2, [@generic={0xb8, 0x8, "9f46b267cb58a7c1fa16ff61167d9d2369f58b1558c2c37a6a37b3c268d2da094168472bea1583a16a91e4d25e25418bff3e2e0b798e27602f5acf670328aea1daa77846d357aa9133fc204a05909eb4e0d192d75733d8562783ce1beaf39104e319af5f57deebc72765ceb88693fbd642b77258c958e8b9a47f3a729d8714d6e955b5dd9588f73aa391ed95de7ec10df48b6f19a838c38d3fa101692300f9000658e4783e6b70dd8bc6efd13c9763ae2300f717ddd2"}, @generic={0x3b, 0x9, "77c55219d510f22748060924fc9aa3c551fc47663a5e7ed83c2529fe1c65e2c2b09a22e2fded72ccafcb0f2b1f06bc6208fc1136c2aa175eea"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x8, 0x0, 0x2, 0x7f, [@generic={0x73, 0x31, "1bc282f8d117622ad1a0b701b02987fcefd6f13fc54d192d0fc7ae1201f01a04d0713dfbefe000b24ce416470e95ddfdc78ffc0801eafc576bd731301f605d434b3c57c2ec4ab03cd23cc30e230bfaf26ef10ec785dac881e2e102c40c5451f98a0960b6c068825ef779ca08eac2dbcb9f"}]}}]}}, {{0x9, 0x4, 0xd4, 0x1, 0x4, 0xe0, 0xa0, 0xb3, 0x9, [@hid_hid={0x9, 0x21, 0x0, 0x6, 0x1, {0x22, 0xcd2}}], [{{0x9, 0x5, 0xb, 0x0, 0x10, 0x3f, 0x7f, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x49, 0x5}]}}, {{0x9, 0x5, 0x1, 0x6, 0x8, 0x56, 0x2, 0x40, [@generic={0xba, 0x7, "e87340d296e8079cf3e731e2664ef4ad6999e19ab5656098ad33c34293721a854af5158b07f18bc5c1f6f0e40415efa10c7f33d2977f69e03d8d1141f258cf46f8f6c993910f86d7f11008453ff6711600485c0fa031afbe3630d9f21a765ca562b9f4e6563f3b522bfe86888d42aeb5d7c4e8d1c64310acccf6856676e635cce92ea242c0a6b0697108f2681a1caa33a364b23005ac20f32ae04af7e57092456512bb744aaddcbc6cfb93b924d095eead0bbe058969d640"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x3, 0x8001}]}}, {{0x9, 0x5, 0x0, 0x4, 0x3ff, 0x6, 0x1, 0xff, [@generic={0x31, 0x24, "f421d3d35748dccbcfda43aa3a8f0860a1aa51a2dc3ccbcdc9e800eb0624b0be188f1b3037ec8b4a8e512febdde11c"}]}}, {{0x9, 0x5, 0x9, 0x10, 0x44c, 0x81, 0x8, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xfc, 0x1}, @generic={0xde, 0x2f, "092caeb0108a3184a6168a36eaf452d75bdff776807bb7a70ae41e824272f29580b817874618e4392fac659c2d5c18f8255a00aa5528bccf9d27ff0524877f19807a1e9eb4173f86fc759098ce0a4bb7420e5f9b8338c5b56ac348553df30aefbf639c7e5257e635cc4a0a283ce3b42557e5365de92e82132b5b9e4ab3f5ac9e2235262535d8e8ba7b6d6301bca94b6c4f8ceba8369962bfc1be95053d2c9aba7367386a9c92e826d6a54cf3edff9abb0acbabc2db6548003cac4bf644304590d3f74cf38b51db4c38fdd0a5c42acc57dbb14bbb97f3cee13ce9db90"}]}}]}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x110, 0xb7, 0x8, 0xe0, 0x10, 0x9}, 0x5d, &(0x7f0000000340)={0x5, 0xf, 0x5d, 0x6, [@wireless={0xb, 0x10, 0x1, 0x2, 0x4, 0x1f, 0x1, 0x1, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "bb06cedd1b4e28ff4c1a21b2ce1e8892"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x9, 0x9, 0x1, 0x80}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0xa, 0xb, 0x1f}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "f6cac795c53a73ed6a93ea94bf96be2a"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "18b321f66d2fdfc4b1955ba406f93a82"}]}, 0x1, [{0xbd, &(0x7f00000003c0)=@string={0xbd, 0x3, "f342dee56c73e334ac155b8d1a9816b9ab6651172fa0470aea9399febc1eee2aae09949862c2a825e6246b98fa0e4512584891cce4e0f767848a82d2470be4fbd1ebc1cb5dc09d98580a582584baa75c156f72345ae5d5eabbef957bed4c7e6177b705e4faf688ac8b0acceff768cd2cdcf23e024d75043a297465687d82cbd67f4d3bf57d8b79c1d50a56fff74fdc1237579701b4d1f679129e55d7573be3d7c6b7123612e7732dd51b314b2eb612f7a53df55139610f93028f47"}}]}) syz_usb_disconnect(r1) getsockopt$MRT(r0, 0x0, 0xcf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x9, 0x20, 0x10, "210272cb635dcaffeeb6679d02e9ea99b5b0df2a89fffffffffffffffb0dee3e68f686391e2d5eebf58a18fcae1ea91ad44cc7af5ae033955c1ad11784240fb1", "a54164365100000800435981500000b91bfe62dcf1a701c7986bf133d4db87539b86094d2f2faa5800", "899402ba9dc4c7b342af83749819d201d80fb05e6117d7c7dfed0a6f3068cffb", [0xfffffffffffffffa, 0xa6e]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)={0x0, 0x0, 0x18}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'tunl0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x8000, 0xff, 0x1f, {{0x13, 0x4, 0x0, 0x35, 0x4c, 0x65, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@lsrr={0x83, 0xf, 0x59, [@rand_addr=0x64010101, @local, @private=0xa010102]}, @noop, @lsrr={0x83, 0x7, 0xd2, [@private=0xa010101]}, @timestamp_prespec={0x44, 0x14, 0xf1, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x400}]}, @timestamp={0x44, 0x8, 0x81, 0x0, 0x7, [0x3]}, @timestamp_addr={0x44, 0x4, 0x1, 0x1, 0x8}]}}}}}) syz_open_dev$loop(&(0x7f0000000100), 0x88d9, 0x40000) 00:12:21 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 00:12:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:21 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0xe, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:21 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xffffffffffffff6a) r0 = fsmount(0xffffffffffffffff, 0x0, 0x2) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), r0) 00:12:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="4cbee9d3abf05eaf41e5f9a638dfee5290cef46218d922fd6d91e63460a39b7f188f0c4613e8fee30cb12110c5d3291d2a0cdee8797d12624fea4d15f6d1"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0xfffffffffffffe4c, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:21 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) [ 741.994515][ T6056] hardirqs last enabled at (2597195): [] __cancel_work_timer+0x3a4/0x540 [ 741.996714][ T6056] hardirqs last disabled at (2597196): [] el1_dbg+0x24/0x80 [ 741.998545][ T6056] softirqs last enabled at (2597188): [] __do_softirq+0xac0/0xd54 [ 742.000622][ T6056] softirqs last disabled at (2596787): [] ____do_softirq+0x14/0x20 [ 742.002528][ T6056] ---[ end trace 0000000000000000 ]--- 00:12:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="4cbee9d3abf05eaf41e5f9a638dfee5290cef46218d922fd6d91e63460a39b7f188f0c4613e8fee30cb12110c5d3291d2a0cdee8797d12624fea4d15f6d1"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0xfffffffffffffe4c, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="4cbee9d3abf05eaf41e5f9a638dfee5290cef46218d922fd6d91e63460a39b7f188f0c4613e8fee30cb12110c5d3291d2a0cdee8797d12624fea4d15f6d1"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0xfffffffffffffe4c, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) 00:12:22 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:22 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xffffffffffffff6a) r0 = fsmount(0xffffffffffffffff, 0x0, 0x2) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), r0) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xffffffffffffff6a) (async) fsmount(0xffffffffffffffff, 0x0, 0x2) (async) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), r0) (async) 00:12:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000140)={'tunl0\x00', 0x0, 0x700, 0x40, 0x101, 0x8, {{0x1d, 0x4, 0x1, 0x2, 0x74, 0x66, 0x0, 0x7e, 0x4, 0x0, @rand_addr=0x64010102, @empty, {[@lsrr={0x83, 0x7, 0x3d, [@multicast1]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x24, 0x97, 0x1, 0x0, [{@multicast1, 0x2}, {@private=0xa010102, 0x9}, {@empty}, {@private=0xa010101, 0x1}]}, @ra={0x94, 0x4}, @noop, @rr={0x7, 0x2b, 0xdd, [@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0xf}, @loopback]}, @end]}}}}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x80800, 0x0, 0xffffffffffffffff}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x1, 0x10}, 0xc) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x3, 0x1f, 0x34, 0x8001, 0x800, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x36}, @map_fd={0x18, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x380000, 0x0, &(0x7f0000000100), 0x40f00, 0x10, '\x00', r0, 0x1b, r1, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x2, 0x800, 0x5ed}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[r2, r3, r4, r5]}, 0x80) [ 742.088995][ T6056] smsusb:smsusb_probe: Device initialized with return code -19 [ 742.161428][ T6056] smsusb:smsusb_probe: board id=12, interface number 93 [ 742.198102][ T6056] smsusb:smsusb_probe: board id=12, interface number 212 [ 742.202456][ T6056] usb 1-1: USB disconnect, device number 87 [ 742.556764][ T6056] usb 1-1: new high-speed USB device number 88 using dummy_hcd [ 742.796826][ T6056] usb 1-1: Using ep0 maxpacket: 16 [ 742.936814][ T6056] usb 1-1: config 5 has an invalid interface number: 93 but max is 2 [ 742.938521][ T6056] usb 1-1: config 5 has an invalid interface number: 212 but max is 2 [ 742.941022][ T6056] usb 1-1: config 5 has no interface number 1 [ 742.942256][ T6056] usb 1-1: config 5 has no interface number 2 [ 742.943615][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0xC has invalid maxpacket 1023, setting to 64 [ 742.945775][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0x2, skipping [ 742.948123][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0x7 has invalid maxpacket 512, setting to 64 [ 742.950364][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0xB, skipping [ 742.952511][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0x1 has invalid maxpacket 1024, setting to 64 [ 742.954647][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0x2, skipping [ 742.957087][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has an invalid endpoint with address 0x80, skipping [ 742.959220][ T6056] usb 1-1: config 5 interface 93 altsetting 7 endpoint 0xA has invalid maxpacket 511, setting to 64 [ 742.961412][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0xB, skipping [ 742.963541][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0x1, skipping [ 742.965655][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has an invalid endpoint with address 0x0, skipping [ 742.967826][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0x9, skipping [ 742.970028][ T6056] usb 1-1: config 5 interface 0 has no altsetting 0 [ 742.971339][ T6056] usb 1-1: config 5 interface 93 has no altsetting 0 [ 742.972699][ T6056] usb 1-1: config 5 interface 212 has no altsetting 0 [ 743.126901][ T6056] usb 1-1: Dual-Role OTG device on HNP port [ 743.147141][ T6056] usb 1-1: New USB device found, idVendor=187f, idProduct=0302, bcdDevice= 8.17 [ 743.149043][ T6056] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 743.150680][ T6056] usb 1-1: Product: syz [ 743.151541][ T6056] usb 1-1: Manufacturer: syz [ 743.152462][ T6056] usb 1-1: SerialNumber: syz [ 743.156217][ T6056] usb 1-1: Interface #212 referenced by multiple IADs [ 743.478040][ T6056] smsusb:smsusb_probe: board id=12, interface number 0 [ 743.676869][ T6056] ------------[ cut here ]------------ [ 743.678003][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 743.679786][ T6056] Modules linked in: [ 743.680624][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 743.682824][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 743.684900][ T6056] Workqueue: usb_hub_wq hub_event [ 743.685963][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 743.687604][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 743.688584][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 743.689538][ T6056] sp : ffff800097356580 [ 743.690379][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 743.692089][ T6056] x26: 0000000000000001 x25: 1fffe00019f90c1d x24: dfff800000000000 [ 743.693782][ T6056] x23: ffff700012e6acb0 x22: ffff0000cfc86100 x21: ffff8000973565a0 [ 743.695390][ T6056] x20: 0000000000000001 x19: ffff0000cfc860e8 x18: 1fffe00036842bc6 [ 743.697113][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 743.698810][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 743.700419][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 743.702030][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 743.703713][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 743.705324][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 743.706932][ T6056] Call trace: [ 743.707579][ T6056] __flush_work+0x1b4/0x1c0 [ 743.708489][ T6056] __cancel_work_timer+0x3e4/0x540 [ 743.709515][ T6056] cancel_work_sync+0x24/0x38 [ 743.710447][ T6056] smsusb_term_device+0x98/0x1cc [ 743.711422][ T6056] smsusb_probe+0xcb8/0x1a0c [ 743.712336][ T6056] usb_probe_interface+0x500/0x984 [ 743.713410][ T6056] really_probe+0x394/0xa7c [ 743.714324][ T6056] __driver_probe_device+0x194/0x3b4 [ 743.715384][ T6056] driver_probe_device+0x78/0x330 [ 743.716411][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 743.717512][ T6056] bus_for_each_drv+0x228/0x2bc [ 743.718429][ T6056] __device_attach+0x2b4/0x434 [ 743.719397][ T6056] device_initial_probe+0x24/0x34 [ 743.720479][ T6056] bus_probe_device+0x178/0x240 [ 743.721475][ T6056] device_add+0xa44/0xdf0 [ 743.722385][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 743.723466][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 743.724734][ T6056] usb_probe_device+0x120/0x25c [ 743.725731][ T6056] really_probe+0x394/0xa7c [ 743.726715][ T6056] __driver_probe_device+0x194/0x3b4 [ 743.727793][ T6056] driver_probe_device+0x78/0x330 [ 743.728781][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 743.729972][ T6056] bus_for_each_drv+0x228/0x2bc [ 743.731011][ T6056] __device_attach+0x2b4/0x434 [ 743.731988][ T6056] device_initial_probe+0x24/0x34 [ 743.733059][ T6056] bus_probe_device+0x178/0x240 [ 743.734042][ T6056] device_add+0xa44/0xdf0 [ 743.734918][ T6056] usb_new_device+0x904/0x142c [ 743.735818][ T6056] hub_event+0x25e4/0x474c [ 743.736693][ T6056] process_one_work+0x788/0x12d4 [ 743.737673][ T6056] worker_thread+0xb68/0xfe8 [ 743.738626][ T6056] kthread+0x288/0x310 [ 743.739457][ T6056] ret_from_fork+0x10/0x20 [ 743.740396][ T6056] irq event stamp: 2612734 [ 743.741323][ T6056] hardirqs last enabled at (2612733): [] __cancel_work_timer+0x3a4/0x540 [ 743.743384][ T6056] hardirqs last disabled at (2612734): [] el1_dbg+0x24/0x80 [ 743.745201][ T6056] softirqs last enabled at (2610842): [] __do_softirq+0xac0/0xd54 [ 743.747143][ T6056] softirqs last disabled at (2610819): [] ____do_softirq+0x14/0x20 [ 743.749155][ T6056] ---[ end trace 0000000000000000 ]--- [ 743.750517][ T6056] ------------[ cut here ]------------ [ 743.751644][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 743.753436][ T6056] Modules linked in: [ 743.754225][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 743.756558][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 743.758621][ T6056] Workqueue: usb_hub_wq hub_event [ 743.759593][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 743.761111][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 743.762123][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 743.763144][ T6056] sp : ffff800097356580 [ 743.763998][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 743.765607][ T6056] x26: 0000000000000001 x25: 1fffe00019f90c41 x24: dfff800000000000 [ 743.767286][ T6056] x23: ffff700012e6acb0 x22: ffff0000cfc86220 x21: ffff8000973565a0 [ 743.768946][ T6056] x20: 0000000000000001 x19: ffff0000cfc86208 x18: 1fffe00036842bc6 [ 743.770488][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 743.772128][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 743.773764][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 743.775438][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 743.777147][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 743.778763][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 743.780391][ T6056] Call trace: [ 743.781078][ T6056] __flush_work+0x1b4/0x1c0 [ 743.781973][ T6056] __cancel_work_timer+0x3e4/0x540 [ 743.783059][ T6056] cancel_work_sync+0x24/0x38 [ 743.784018][ T6056] smsusb_term_device+0x98/0x1cc [ 743.785058][ T6056] smsusb_probe+0xcb8/0x1a0c [ 743.786081][ T6056] usb_probe_interface+0x500/0x984 [ 743.787118][ T6056] really_probe+0x394/0xa7c [ 743.788036][ T6056] __driver_probe_device+0x194/0x3b4 [ 743.789172][ T6056] driver_probe_device+0x78/0x330 [ 743.790211][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 743.791283][ T6056] bus_for_each_drv+0x228/0x2bc [ 743.792288][ T6056] __device_attach+0x2b4/0x434 [ 743.793286][ T6056] device_initial_probe+0x24/0x34 [ 743.794228][ T6056] bus_probe_device+0x178/0x240 [ 743.795255][ T6056] device_add+0xa44/0xdf0 [ 743.796099][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 743.797240][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 743.798343][ T6056] usb_probe_device+0x120/0x25c [ 743.799342][ T6056] really_probe+0x394/0xa7c [ 743.800272][ T6056] __driver_probe_device+0x194/0x3b4 [ 743.801438][ T6056] driver_probe_device+0x78/0x330 [ 743.802496][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 743.803584][ T6056] bus_for_each_drv+0x228/0x2bc [ 743.804565][ T6056] __device_attach+0x2b4/0x434 [ 743.805570][ T6056] device_initial_probe+0x24/0x34 [ 743.806616][ T6056] bus_probe_device+0x178/0x240 [ 743.807617][ T6056] device_add+0xa44/0xdf0 [ 743.808508][ T6056] usb_new_device+0x904/0x142c [ 743.809490][ T6056] hub_event+0x25e4/0x474c [ 743.810465][ T6056] process_one_work+0x788/0x12d4 [ 743.811419][ T6056] worker_thread+0xb68/0xfe8 [ 743.812366][ T6056] kthread+0x288/0x310 [ 743.813220][ T6056] ret_from_fork+0x10/0x20 [ 743.814094][ T6056] irq event stamp: 2612790 [ 743.814962][ T6056] hardirqs last enabled at (2612789): [] __cancel_work_timer+0x3a4/0x540 [ 743.817056][ T6056] hardirqs last disabled at (2612790): [] el1_dbg+0x24/0x80 [ 743.818928][ T6056] softirqs last enabled at (2612786): [] __do_softirq+0xac0/0xd54 [ 743.820891][ T6056] softirqs last disabled at (2612737): [] ____do_softirq+0x14/0x20 [ 743.822954][ T6056] ---[ end trace 0000000000000000 ]--- [ 743.825180][ T6056] ------------[ cut here ]------------ [ 743.826259][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 743.828120][ T6056] Modules linked in: [ 743.828976][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 743.831323][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 743.833430][ T6056] Workqueue: usb_hub_wq hub_event [ 743.834470][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 743.836038][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 743.837135][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 743.838125][ T6056] sp : ffff800097356580 [ 743.838904][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 743.840605][ T6056] x26: 0000000000000001 x25: 1fffe00019f90c65 x24: dfff800000000000 [ 743.842204][ T6056] x23: ffff700012e6acb0 x22: ffff0000cfc86340 x21: ffff8000973565a0 [ 743.843782][ T6056] x20: 0000000000000001 x19: ffff0000cfc86328 x18: 1fffe00036842bc6 [ 743.845417][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 743.847094][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 743.848713][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 743.850315][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 743.851994][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 743.853642][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 743.855313][ T6056] Call trace: [ 743.855952][ T6056] __flush_work+0x1b4/0x1c0 [ 743.856826][ T6056] __cancel_work_timer+0x3e4/0x540 [ 743.857909][ T6056] cancel_work_sync+0x24/0x38 [ 743.858912][ T6056] smsusb_term_device+0x98/0x1cc [ 743.859948][ T6056] smsusb_probe+0xcb8/0x1a0c [ 743.860877][ T6056] usb_probe_interface+0x500/0x984 [ 743.861910][ T6056] really_probe+0x394/0xa7c [ 743.862829][ T6056] __driver_probe_device+0x194/0x3b4 [ 743.863966][ T6056] driver_probe_device+0x78/0x330 [ 743.865029][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 743.866183][ T6056] bus_for_each_drv+0x228/0x2bc [ 743.867221][ T6056] __device_attach+0x2b4/0x434 [ 743.868265][ T6056] device_initial_probe+0x24/0x34 [ 743.869335][ T6056] bus_probe_device+0x178/0x240 [ 743.870318][ T6056] device_add+0xa44/0xdf0 [ 743.871318][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 743.872480][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 743.873586][ T6056] usb_probe_device+0x120/0x25c [ 743.874543][ T6056] really_probe+0x394/0xa7c [ 743.875455][ T6056] __driver_probe_device+0x194/0x3b4 [ 743.876592][ T6056] driver_probe_device+0x78/0x330 [ 743.877628][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 743.878686][ T6056] bus_for_each_drv+0x228/0x2bc [ 743.879778][ T6056] __device_attach+0x2b4/0x434 [ 743.880754][ T6056] device_initial_probe+0x24/0x34 [ 743.881804][ T6056] bus_probe_device+0x178/0x240 [ 743.882848][ T6056] device_add+0xa44/0xdf0 [ 743.883690][ T6056] usb_new_device+0x904/0x142c [ 743.884665][ T6056] hub_event+0x25e4/0x474c [ 743.885584][ T6056] process_one_work+0x788/0x12d4 [ 743.886583][ T6056] worker_thread+0xb68/0xfe8 [ 743.887548][ T6056] kthread+0x288/0x310 [ 743.888420][ T6056] ret_from_fork+0x10/0x20 [ 743.889362][ T6056] irq event stamp: 2613414 [ 743.890283][ T6056] hardirqs last enabled at (2613413): [] __cancel_work_timer+0x3a4/0x540 [ 743.892372][ T6056] hardirqs last disabled at (2613414): [] el1_dbg+0x24/0x80 [ 743.894236][ T6056] softirqs last enabled at (2613410): [] __do_softirq+0xac0/0xd54 [ 743.896271][ T6056] softirqs last disabled at (2612793): [] ____do_softirq+0x14/0x20 [ 743.898318][ T6056] ---[ end trace 0000000000000000 ]--- [ 743.900458][ T6056] ------------[ cut here ]------------ [ 743.901501][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 743.903424][ T6056] Modules linked in: [ 743.904189][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 743.906399][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 743.908448][ T6056] Workqueue: usb_hub_wq hub_event [ 743.909461][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 743.911018][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 743.912098][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 743.913078][ T6056] sp : ffff800097356580 [ 743.913870][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 743.915570][ T6056] x26: 0000000000000001 x25: 1fffe00019f90c89 x24: dfff800000000000 [ 743.917269][ T6056] x23: ffff700012e6acb0 x22: ffff0000cfc86460 x21: ffff8000973565a0 [ 743.918943][ T6056] x20: 0000000000000001 x19: ffff0000cfc86448 x18: 1fffe00036842bc6 [ 743.920633][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 743.922243][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 743.923911][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 743.925521][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 743.927142][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 743.928906][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 743.930558][ T6056] Call trace: [ 743.931177][ T6056] __flush_work+0x1b4/0x1c0 [ 743.932141][ T6056] __cancel_work_timer+0x3e4/0x540 [ 743.933192][ T6056] cancel_work_sync+0x24/0x38 [ 743.934147][ T6056] smsusb_term_device+0x98/0x1cc [ 743.935215][ T6056] smsusb_probe+0xcb8/0x1a0c [ 743.936195][ T6056] usb_probe_interface+0x500/0x984 [ 743.937252][ T6056] really_probe+0x394/0xa7c [ 743.938219][ T6056] __driver_probe_device+0x194/0x3b4 [ 743.939331][ T6056] driver_probe_device+0x78/0x330 [ 743.940369][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 743.941533][ T6056] bus_for_each_drv+0x228/0x2bc [ 743.942555][ T6056] __device_attach+0x2b4/0x434 [ 743.943606][ T6056] device_initial_probe+0x24/0x34 [ 743.944638][ T6056] bus_probe_device+0x178/0x240 [ 743.945614][ T6056] device_add+0xa44/0xdf0 [ 743.946512][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 743.947715][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 743.948899][ T6056] usb_probe_device+0x120/0x25c [ 743.949874][ T6056] really_probe+0x394/0xa7c [ 743.950806][ T6056] __driver_probe_device+0x194/0x3b4 [ 743.951919][ T6056] driver_probe_device+0x78/0x330 [ 743.952932][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 743.954047][ T6056] bus_for_each_drv+0x228/0x2bc [ 743.955054][ T6056] __device_attach+0x2b4/0x434 [ 743.955980][ T6056] device_initial_probe+0x24/0x34 [ 743.957066][ T6056] bus_probe_device+0x178/0x240 [ 743.958082][ T6056] device_add+0xa44/0xdf0 [ 743.958990][ T6056] usb_new_device+0x904/0x142c [ 743.959979][ T6056] hub_event+0x25e4/0x474c [ 743.960886][ T6056] process_one_work+0x788/0x12d4 [ 743.961873][ T6056] worker_thread+0xb68/0xfe8 [ 743.962792][ T6056] kthread+0x288/0x310 [ 743.963588][ T6056] ret_from_fork+0x10/0x20 [ 743.964534][ T6056] irq event stamp: 2613858 [ 743.965392][ T6056] hardirqs last enabled at (2613857): [] __cancel_work_timer+0x3a4/0x540 [ 743.967559][ T6056] hardirqs last disabled at (2613858): [] el1_dbg+0x24/0x80 [ 743.969304][ T6056] softirqs last enabled at (2613850): [] __do_softirq+0xac0/0xd54 [ 743.971205][ T6056] softirqs last disabled at (2613417): [] ____do_softirq+0x14/0x20 [ 743.973125][ T6056] ---[ end trace 0000000000000000 ]--- [ 743.975245][ T6056] ------------[ cut here ]------------ [ 743.976306][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 743.978192][ T6056] Modules linked in: [ 743.978995][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 743.981311][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 743.983417][ T6056] Workqueue: usb_hub_wq hub_event [ 743.984410][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 743.986084][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 743.987073][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 743.988060][ T6056] sp : ffff800097356580 [ 743.988901][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 743.990585][ T6056] x26: 0000000000000001 x25: 1fffe00019f90cad x24: dfff800000000000 [ 743.992293][ T6056] x23: ffff700012e6acb0 x22: ffff0000cfc86580 x21: ffff8000973565a0 [ 743.993928][ T6056] x20: 0000000000000001 x19: ffff0000cfc86568 x18: 1fffe00036842bc6 [ 743.995606][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 743.997292][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 743.998991][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 744.000586][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 744.002318][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 744.003968][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 744.005552][ T6056] Call trace: [ 744.006262][ T6056] __flush_work+0x1b4/0x1c0 [ 744.007209][ T6056] __cancel_work_timer+0x3e4/0x540 [ 744.008247][ T6056] cancel_work_sync+0x24/0x38 [ 744.009146][ T6056] smsusb_term_device+0x98/0x1cc [ 744.010161][ T6056] smsusb_probe+0xcb8/0x1a0c [ 744.011097][ T6056] usb_probe_interface+0x500/0x984 [ 744.012215][ T6056] really_probe+0x394/0xa7c [ 744.013154][ T6056] __driver_probe_device+0x194/0x3b4 [ 744.014200][ T6056] driver_probe_device+0x78/0x330 [ 744.015165][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 744.016229][ T6056] bus_for_each_drv+0x228/0x2bc [ 744.017182][ T6056] __device_attach+0x2b4/0x434 [ 744.018176][ T6056] device_initial_probe+0x24/0x34 [ 744.019169][ T6056] bus_probe_device+0x178/0x240 [ 744.020138][ T6056] device_add+0xa44/0xdf0 [ 744.020992][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 744.022210][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 744.023294][ T6056] usb_probe_device+0x120/0x25c [ 744.024275][ T6056] really_probe+0x394/0xa7c [ 744.025188][ T6056] __driver_probe_device+0x194/0x3b4 [ 744.026255][ T6056] driver_probe_device+0x78/0x330 [ 744.027259][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 744.028474][ T6056] bus_for_each_drv+0x228/0x2bc [ 744.029495][ T6056] __device_attach+0x2b4/0x434 [ 744.030540][ T6056] device_initial_probe+0x24/0x34 [ 744.031542][ T6056] bus_probe_device+0x178/0x240 [ 744.032562][ T6056] device_add+0xa44/0xdf0 [ 744.033423][ T6056] usb_new_device+0x904/0x142c [ 744.034442][ T6056] hub_event+0x25e4/0x474c [ 744.035380][ T6056] process_one_work+0x788/0x12d4 [ 744.036519][ T6056] worker_thread+0xb68/0xfe8 [ 744.037525][ T6056] kthread+0x288/0x310 [ 744.038366][ T6056] ret_from_fork+0x10/0x20 [ 744.039298][ T6056] irq event stamp: 2614526 [ 744.040172][ T6056] hardirqs last enabled at (2614525): [] __cancel_work_timer+0x3a4/0x540 [ 744.042239][ T6056] hardirqs last disabled at (2614526): [] el1_dbg+0x24/0x80 [ 744.044017][ T6056] softirqs last enabled at (2614522): [] __do_softirq+0xac0/0xd54 [ 744.045966][ T6056] softirqs last disabled at (2613861): [] ____do_softirq+0x14/0x20 [ 744.047986][ T6056] ---[ end trace 0000000000000000 ]--- [ 744.049312][ T6056] ------------[ cut here ]------------ [ 744.050449][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 744.052331][ T6056] Modules linked in: [ 744.053157][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 744.055466][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 744.057534][ T6056] Workqueue: usb_hub_wq hub_event [ 744.058572][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 744.060116][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 744.061122][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 744.062119][ T6056] sp : ffff800097356580 [ 744.063026][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 744.064695][ T6056] x26: 0000000000000001 x25: 1fffe00019f90cd1 x24: dfff800000000000 [ 744.066291][ T6056] x23: ffff700012e6acb0 x22: ffff0000cfc866a0 x21: ffff8000973565a0 [ 744.067968][ T6056] x20: 0000000000000001 x19: ffff0000cfc86688 x18: 1fffe00036842bc6 [ 744.069569][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 744.071206][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 744.072986][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 744.074643][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 744.076255][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 744.077975][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 744.079603][ T6056] Call trace: [ 744.080280][ T6056] __flush_work+0x1b4/0x1c0 [ 744.081169][ T6056] __cancel_work_timer+0x3e4/0x540 [ 744.082263][ T6056] cancel_work_sync+0x24/0x38 [ 744.083264][ T6056] smsusb_term_device+0x98/0x1cc [ 744.084305][ T6056] smsusb_probe+0xcb8/0x1a0c [ 744.085267][ T6056] usb_probe_interface+0x500/0x984 [ 744.086318][ T6056] really_probe+0x394/0xa7c [ 744.087275][ T6056] __driver_probe_device+0x194/0x3b4 [ 744.088384][ T6056] driver_probe_device+0x78/0x330 [ 744.089409][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 744.090539][ T6056] bus_for_each_drv+0x228/0x2bc [ 744.091493][ T6056] __device_attach+0x2b4/0x434 [ 744.092556][ T6056] device_initial_probe+0x24/0x34 [ 744.093561][ T6056] bus_probe_device+0x178/0x240 [ 744.094575][ T6056] device_add+0xa44/0xdf0 [ 744.095478][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 744.096632][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 744.097777][ T6056] usb_probe_device+0x120/0x25c [ 744.098761][ T6056] really_probe+0x394/0xa7c [ 744.099759][ T6056] __driver_probe_device+0x194/0x3b4 [ 744.100811][ T6056] driver_probe_device+0x78/0x330 [ 744.101812][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 744.102953][ T6056] bus_for_each_drv+0x228/0x2bc [ 744.103921][ T6056] __device_attach+0x2b4/0x434 [ 744.104881][ T6056] device_initial_probe+0x24/0x34 [ 744.105921][ T6056] bus_probe_device+0x178/0x240 [ 744.107006][ T6056] device_add+0xa44/0xdf0 [ 744.107931][ T6056] usb_new_device+0x904/0x142c [ 744.108890][ T6056] hub_event+0x25e4/0x474c [ 744.109783][ T6056] process_one_work+0x788/0x12d4 [ 744.110826][ T6056] worker_thread+0xb68/0xfe8 [ 744.111709][ T6056] kthread+0x288/0x310 [ 744.112561][ T6056] ret_from_fork+0x10/0x20 [ 744.113488][ T6056] irq event stamp: 2614582 [ 744.114426][ T6056] hardirqs last enabled at (2614581): [] __cancel_work_timer+0x3a4/0x540 [ 744.116578][ T6056] hardirqs last disabled at (2614582): [] el1_dbg+0x24/0x80 [ 744.118364][ T6056] softirqs last enabled at (2614574): [] __do_softirq+0xac0/0xd54 [ 744.120276][ T6056] softirqs last disabled at (2614529): [] ____do_softirq+0x14/0x20 [ 744.122303][ T6056] ---[ end trace 0000000000000000 ]--- [ 744.124608][ T6056] ------------[ cut here ]------------ [ 744.125741][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 744.127560][ T6056] Modules linked in: [ 744.128389][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 744.130697][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 744.132704][ T6056] Workqueue: usb_hub_wq hub_event [ 744.133728][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 744.135264][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 744.136204][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 744.137149][ T6056] sp : ffff800097356580 [ 744.138036][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 744.139795][ T6056] x26: 0000000000000001 x25: 1fffe00019f90cf5 x24: dfff800000000000 [ 744.141457][ T6056] x23: ffff700012e6acb0 x22: ffff0000cfc867c0 x21: ffff8000973565a0 [ 744.143008][ T6056] x20: 0000000000000001 x19: ffff0000cfc867a8 x18: 1fffe00036842bc6 [ 744.144674][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 744.146293][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 744.147910][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 744.149607][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 744.151277][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 744.152884][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 744.154533][ T6056] Call trace: [ 744.155185][ T6056] __flush_work+0x1b4/0x1c0 [ 744.156106][ T6056] __cancel_work_timer+0x3e4/0x540 [ 744.157193][ T6056] cancel_work_sync+0x24/0x38 [ 744.158149][ T6056] smsusb_term_device+0x98/0x1cc [ 744.159186][ T6056] smsusb_probe+0xcb8/0x1a0c [ 744.160128][ T6056] usb_probe_interface+0x500/0x984 [ 744.161151][ T6056] really_probe+0x394/0xa7c [ 744.162095][ T6056] __driver_probe_device+0x194/0x3b4 [ 744.163220][ T6056] driver_probe_device+0x78/0x330 [ 744.164324][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 744.165394][ T6056] bus_for_each_drv+0x228/0x2bc [ 744.166371][ T6056] __device_attach+0x2b4/0x434 [ 744.167452][ T6056] device_initial_probe+0x24/0x34 [ 744.168569][ T6056] bus_probe_device+0x178/0x240 [ 744.169610][ T6056] device_add+0xa44/0xdf0 [ 744.170481][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 744.171589][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 744.172710][ T6056] usb_probe_device+0x120/0x25c [ 744.173648][ T6056] really_probe+0x394/0xa7c [ 744.174615][ T6056] __driver_probe_device+0x194/0x3b4 [ 744.175794][ T6056] driver_probe_device+0x78/0x330 [ 744.176846][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 744.177982][ T6056] bus_for_each_drv+0x228/0x2bc [ 744.179013][ T6056] __device_attach+0x2b4/0x434 [ 744.180013][ T6056] device_initial_probe+0x24/0x34 [ 744.181120][ T6056] bus_probe_device+0x178/0x240 [ 744.182178][ T6056] device_add+0xa44/0xdf0 [ 744.183089][ T6056] usb_new_device+0x904/0x142c [ 744.184081][ T6056] hub_event+0x25e4/0x474c [ 744.185040][ T6056] process_one_work+0x788/0x12d4 [ 744.186172][ T6056] worker_thread+0xb68/0xfe8 [ 744.187202][ T6056] kthread+0x288/0x310 [ 744.188069][ T6056] ret_from_fork+0x10/0x20 [ 744.189009][ T6056] irq event stamp: 2615248 [ 744.190010][ T6056] hardirqs last enabled at (2615247): [] __cancel_work_timer+0x3a4/0x540 [ 744.192091][ T6056] hardirqs last disabled at (2615248): [] el1_dbg+0x24/0x80 [ 744.193958][ T6056] softirqs last enabled at (2615244): [] __do_softirq+0xac0/0xd54 [ 744.195982][ T6056] softirqs last disabled at (2614585): [] ____do_softirq+0x14/0x20 [ 744.197959][ T6056] ---[ end trace 0000000000000000 ]--- 00:12:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) r1 = syz_usb_connect(0x3, 0xc09, &(0x7f0000000b40)={{0x12, 0x1, 0x110, 0x6d, 0x9b, 0xc0, 0x10, 0x187f, 0x302, 0x817, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xbf7, 0x3, 0x5, 0xe1, 0x90, 0x5, [{{0x9, 0x4, 0x0, 0x5, 0xd, 0xb6, 0x6b, 0x54, 0x13, [@generic={0xe2, 0x23, "7a135dc100e8e7cc0545b933efe6186650fa4d6ff8ff9fc6d10c134a23bfbb74887d4aa605f5c5d4830b8e73d1077874aa7f91199d1556a5ed06dcde8c52af76321c341be3d7f1191b9ae487d9bedc3c24ee98fff2cbcfdc58240ece44e8b1460632e4385af1ec2e0fde5bae7172a44c018cf0ea7e1b37814f0b6fd97021b0c20f4e0cd845f7a1a64a146e7c35e6bf2ea0b26297cedeabe910d0fce966ac5ad60179ef7591dc8a65ab0f543e997d4eab639c302a73287b25af116698ffe04f1badac7fbf39321b595db550da19b44380cc29ccabe8229201c7341b8fee337e4d"}], [{{0x9, 0x5, 0x3, 0x0, 0x20, 0xff, 0x92, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xad, 0x1}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x0, 0x9}]}}, {{0x9, 0x5, 0x6, 0x1, 0x200, 0x9, 0x0, 0x9, [@generic={0x8b, 0xa, "9d57533c1ba63b12a5ff9df5b4b9750ed4eef8ce0d29cb07bdafc6a6fedb6d77d5e1e88fa00238f71708e72c3ae09b23573789cb02e3586b68def0ca1cb058469af9216d4af47f8d1e751312387dd73ac2b604640f37c7a97ab70efdcebd398796a8da1f73a489b754e83716d744d13150c8a14c0f7ec50644ac0c4705d6d3df4b66262168cd15cee4"}]}}, {{0x9, 0x5, 0xc, 0x0, 0x3ff, 0x0, 0x3, 0xc, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x5, 0x3}]}}, {{0x9, 0x5, 0x2, 0x4, 0x28, 0x0, 0x40, 0x40, [@generic={0x2d, 0x31, "4b019e17c14610a75bba08075ba34f680fa01804b12180ea718c3d6ca26ca189829eff3cbb86c68858f8ae"}, @generic={0xb3, 0xb, "8c7b81e6fbeba6e961044b82ca11b41e3ed227e77801e489384134008c874cb5e1e3374b3cce73b8feaa6fe2188c1140e3ee90a1e608079eb6ab1569ace1d4a8fb2cde9b9535081b7e6c753079a2d2046e98274f410ac0e9520f1fcdd2df89a3adee4fea425b814de64f097f7765b2481b9ae6a5ad330f60039736d04df527a5b36143d7c1b8c747d8078a2435e2abaaa47f2cfa88bace765beec113e192b7014f8e0c24ba9e9f647a5c399d92757b1e72"}]}}, {{0x9, 0x5, 0xb, 0x10, 0x8, 0x4, 0x0, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x9}]}}, {{0x9, 0x5, 0x2, 0x10, 0x20, 0x20, 0x0, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x5, 0x3}]}}, {{0x9, 0x5, 0x7, 0x4, 0x200, 0x4, 0x8, 0x9, [@generic={0xe0, 0x10, "07f49d639f75d400d6abe0771d265ca87ba6d6995670761d98bb81a56c47828afe3e4f344aa778938ceb36678b36b0cf53bf5e4696853b7def97dacf969eec79c580987120676338746f3a5fe04b04042573709aca6e6993e7bb7c9042781e19c282e9515d4a505c1b86dab3c7578d9eff062562eb7020c5c0cd47720881fce52bf447db4ec6d4485c4b03deb6350d2f65c95fea9fbc12a8934aa434596dcaae56712fb690a17d68e71d2ac377fab9f7717ea5dbbc0a0dbf48c859b30f658323c572f507e020973f10c070b4aa0ba9cb1e0dce42e014c5e5cdcac2004cc7"}]}}, {{0x9, 0x5, 0xb, 0x8, 0x10, 0x3f, 0x7, 0x81, [@generic={0xdd, 0x24, "9bfde775d18e5240467003251666c37b63ecf76d83b51941878dcae90135f728bd954117607e9d0703707efca1c8d16536ac4b8b02ccce1f36f4128365b037f7a98365f8f37c9907bde723b02d5db3113a58296f01ef1f85a30bc11facff51510c2f007784115330ad0ae44a22885aa93892680b3aae2aa5a886a7e1314bed5610a447f26eab10d7c7ea6e344501c5daec8882d6354bf482d32bac5cb2e3c60d36ab58845a819ad5c9693b197553d69e293f4b6ff3c4d5de3ea409b2bb46008aca955aa97239a502f74684e1a196ef75132780bbaeec91f60ff9b0"}]}}, {{0x9, 0x5, 0x5, 0x0, 0x10, 0x20, 0x80, 0x3, [@generic={0xd9, 0xb, "aca4fa4252d9ed94294cf72d77e1acb265500fc4cfda6409078e8d237d15fba5e6301f3ac2835dc96ba8147ce6f2333e065bb99f211b00d266aa790b2c82fe9be07397447db4411aa1d7b0b7b436cc4a6d911787a8c8217f8844ff4db722fa17b0b02d2a45add096a2ca67699b53d6eba77da61d104092f89df48c6f4960d78ef3e00afc9726e49231de367635f0aa33ed95dfc5e10685e06d65d7e7f9c69a37fb54ebbb4aa48653621e2fb082255461d7a514eb6b16fd2b17418755dbf73c27fb7390a88a799f89a69632a7b1c26c62763ab6206a4080"}]}}, {{0x9, 0x5, 0x1, 0x10, 0x400, 0x6, 0x1f, 0x1, [@generic={0xa7, 0x21, "14811a29c5ae1d9910c328e6c77cb2b6d3d558f684f1a8b7b1ba8b1a33a0a48fcf1bf2e9d7b39385e84fd58f4a18b3123759428be33d86fbf505088d455d16326a64df0419df3c331b93f7b85a30ed125322b01eaa450db7698a44cc0a05cf33198561962968485406e815fb0868f08c6a16b37a9d5e03a81eb0df5fee57246db3689f927b9380e894069cad4796691cf02e381ac60e3b3f6b0cc865461b8644619b276ce8"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x5, 0x1000}]}}, {{0x9, 0x5, 0x9, 0x4, 0x40, 0x8, 0x22, 0x1f, [@generic={0xa6, 0xc, "f39e187d06bd2c24cb7a17470178ae886bd270ca5246b031140c7dc39b59a1b8c49fb3f9312b9df72a79096f9a017d89d5f0c7eeee68090487fec50521bb698e1c59814f87036124f3301d2ae6297071b1e25feada1341973b66865a11648613bcdebe40c78646de0604f93ca6e8f621fad79012739775e530b1f3174accf9cb00c70957ea07f9bb6431603351c76190670d498fb95818d6c37a040ff67db0e82baf2083"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x408, 0x8, 0x5, 0x8, [@generic={0x66, 0x31, "c48884bd4e099a7a00cdf4c68eda2f87bf1edd37f52cd990b7e59fc26bd60ab5c59455c46016f13b47502646c4ad549dd20613e6830d2b505a85add960a74e06096b1e3e01fad59a60e0e2ca0a23dd19008a9e4616080e28a420b1215659801217c3627e"}]}}, {{0x9, 0x5, 0x80, 0x8, 0x3ff, 0x0, 0x42, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x8, 0x5}, @generic={0xc0, 0x23, "bb6a114ac086aeab845a9dcbf82da6ce1da151c285b8b20f9cc185d697d205c321e2537a3ec0dc14a1a8ed660d92b8222ed6f2730feca67f8327eb6d799a3e8d6a9dca9e74b20eb60bcd7f6d7cce6dc09405d83c5b7cc35eeb5dc8b5cb0f4f1b0cbc5cacfb5c00a9ecb6f032a4cbea22f2dd9148c49dc831a26d2d6889d2253ba72f2d6dab1b3f06723e92da2126200190f1a3f0d1c400d3c1d0297c3757ce9488e1ec1a3df18958a1bac48938932215c3dda45526da9990e22cac6400c4"}]}}]}}, {{0x9, 0x4, 0x5d, 0x7, 0x2, 0xff, 0x4, 0x6a, 0x0, [@cdc_ncm={{0x9, 0x24, 0x6, 0x0, 0x1, "1c3ecb34"}, {0x5, 0x24, 0x0, 0xc3}, {0xd, 0x24, 0xf, 0x1, 0x3, 0x7fff, 0x80, 0x6}, {0x6, 0x24, 0x1a, 0xfff, 0x9}, [@mdlm={0x15, 0x24, 0x12, 0x1}, @mdlm={0x15, 0x24, 0x12, 0x4}]}, @hid_hid={0x9, 0x21, 0x3ff, 0xa8, 0x1, {0x22, 0x8e1}}], [{{0x9, 0x5, 0xa, 0x0, 0x1ff, 0x8, 0x9, 0x2, [@generic={0xb8, 0x8, "9f46b267cb58a7c1fa16ff61167d9d2369f58b1558c2c37a6a37b3c268d2da094168472bea1583a16a91e4d25e25418bff3e2e0b798e27602f5acf670328aea1daa77846d357aa9133fc204a05909eb4e0d192d75733d8562783ce1beaf39104e319af5f57deebc72765ceb88693fbd642b77258c958e8b9a47f3a729d8714d6e955b5dd9588f73aa391ed95de7ec10df48b6f19a838c38d3fa101692300f9000658e4783e6b70dd8bc6efd13c9763ae2300f717ddd2"}, @generic={0x3b, 0x9, "77c55219d510f22748060924fc9aa3c551fc47663a5e7ed83c2529fe1c65e2c2b09a22e2fded72ccafcb0f2b1f06bc6208fc1136c2aa175eea"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x8, 0x0, 0x2, 0x7f, [@generic={0x73, 0x31, "1bc282f8d117622ad1a0b701b02987fcefd6f13fc54d192d0fc7ae1201f01a04d0713dfbefe000b24ce416470e95ddfdc78ffc0801eafc576bd731301f605d434b3c57c2ec4ab03cd23cc30e230bfaf26ef10ec785dac881e2e102c40c5451f98a0960b6c068825ef779ca08eac2dbcb9f"}]}}]}}, {{0x9, 0x4, 0xd4, 0x1, 0x4, 0xe0, 0xa0, 0xb3, 0x9, [@hid_hid={0x9, 0x21, 0x0, 0x6, 0x1, {0x22, 0xcd2}}], [{{0x9, 0x5, 0xb, 0x0, 0x10, 0x3f, 0x7f, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x49, 0x5}]}}, {{0x9, 0x5, 0x1, 0x6, 0x8, 0x56, 0x2, 0x40, [@generic={0xba, 0x7, "e87340d296e8079cf3e731e2664ef4ad6999e19ab5656098ad33c34293721a854af5158b07f18bc5c1f6f0e40415efa10c7f33d2977f69e03d8d1141f258cf46f8f6c993910f86d7f11008453ff6711600485c0fa031afbe3630d9f21a765ca562b9f4e6563f3b522bfe86888d42aeb5d7c4e8d1c64310acccf6856676e635cce92ea242c0a6b0697108f2681a1caa33a364b23005ac20f32ae04af7e57092456512bb744aaddcbc6cfb93b924d095eead0bbe058969d640"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x3, 0x8001}]}}, {{0x9, 0x5, 0x0, 0x4, 0x3ff, 0x6, 0x1, 0xff, [@generic={0x31, 0x24, "f421d3d35748dccbcfda43aa3a8f0860a1aa51a2dc3ccbcdc9e800eb0624b0be188f1b3037ec8b4a8e512febdde11c"}]}}, {{0x9, 0x5, 0x9, 0x10, 0x44c, 0x81, 0x8, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xfc, 0x1}, @generic={0xde, 0x2f, "092caeb0108a3184a6168a36eaf452d75bdff776807bb7a70ae41e824272f29580b817874618e4392fac659c2d5c18f8255a00aa5528bccf9d27ff0524877f19807a1e9eb4173f86fc759098ce0a4bb7420e5f9b8338c5b56ac348553df30aefbf639c7e5257e635cc4a0a283ce3b42557e5365de92e82132b5b9e4ab3f5ac9e2235262535d8e8ba7b6d6301bca94b6c4f8ceba8369962bfc1be95053d2c9aba7367386a9c92e826d6a54cf3edff9abb0acbabc2db6548003cac4bf644304590d3f74cf38b51db4c38fdd0a5c42acc57dbb14bbb97f3cee13ce9db90"}]}}]}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x110, 0xb7, 0x8, 0xe0, 0x10, 0x9}, 0x5d, &(0x7f0000000340)={0x5, 0xf, 0x5d, 0x6, [@wireless={0xb, 0x10, 0x1, 0x2, 0x4, 0x1f, 0x1, 0x1, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "bb06cedd1b4e28ff4c1a21b2ce1e8892"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x9, 0x9, 0x1, 0x80}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0xa, 0xb, 0x1f}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "f6cac795c53a73ed6a93ea94bf96be2a"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "18b321f66d2fdfc4b1955ba406f93a82"}]}, 0x1, [{0xbd, &(0x7f00000003c0)=@string={0xbd, 0x3, "f342dee56c73e334ac155b8d1a9816b9ab6651172fa0470aea9399febc1eee2aae09949862c2a825e6246b98fa0e4512584891cce4e0f767848a82d2470be4fbd1ebc1cb5dc09d98580a582584baa75c156f72345ae5d5eabbef957bed4c7e6177b705e4faf688ac8b0acceff768cd2cdcf23e024d75043a297465687d82cbd67f4d3bf57d8b79c1d50a56fff74fdc1237579701b4d1f679129e55d7573be3d7c6b7123612e7732dd51b314b2eb612f7a53df55139610f93028f47"}}]}) syz_usb_disconnect(r1) getsockopt$MRT(r0, 0x0, 0xcf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x9, 0x20, 0x10, "210272cb635dcaffeeb6679d02e9ea99b5b0df2a89fffffffffffffffb0dee3e68f686391e2d5eebf58a18fcae1ea91ad44cc7af5ae033955c1ad11784240fb1", "a54164365100000800435981500000b91bfe62dcf1a701c7986bf133d4db87539b86094d2f2faa5800", "899402ba9dc4c7b342af83749819d201d80fb05e6117d7c7dfed0a6f3068cffb", [0xfffffffffffffffa, 0xa6e]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)={0x0, 0x0, 0x18}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'tunl0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x8000, 0xff, 0x1f, {{0x13, 0x4, 0x0, 0x35, 0x4c, 0x65, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@lsrr={0x83, 0xf, 0x59, [@rand_addr=0x64010101, @local, @private=0xa010102]}, @noop, @lsrr={0x83, 0x7, 0xd2, [@private=0xa010101]}, @timestamp_prespec={0x44, 0x14, 0xf1, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x400}]}, @timestamp={0x44, 0x8, 0x81, 0x0, 0x7, [0x3]}, @timestamp_addr={0x44, 0x4, 0x1, 0x1, 0x8}]}}}}}) syz_open_dev$loop(&(0x7f0000000100), 0x88d9, 0x40000) 00:12:24 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:12:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:12:24 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xffffffffffffff6a) (async) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xffffffffffffff6a) r0 = fsmount(0xffffffffffffffff, 0x0, 0x2) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), r0) 00:12:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000140)={'tunl0\x00', 0x0, 0x700, 0x40, 0x101, 0x8, {{0x1d, 0x4, 0x1, 0x2, 0x74, 0x66, 0x0, 0x7e, 0x4, 0x0, @rand_addr=0x64010102, @empty, {[@lsrr={0x83, 0x7, 0x3d, [@multicast1]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x24, 0x97, 0x1, 0x0, [{@multicast1, 0x2}, {@private=0xa010102, 0x9}, {@empty}, {@private=0xa010101, 0x1}]}, @ra={0x94, 0x4}, @noop, @rr={0x7, 0x2b, 0xdd, [@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0xf}, @loopback]}, @end]}}}}}) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000140)={'tunl0\x00', 0x0, 0x700, 0x40, 0x101, 0x8, {{0x1d, 0x4, 0x1, 0x2, 0x74, 0x66, 0x0, 0x7e, 0x4, 0x0, @rand_addr=0x64010102, @empty, {[@lsrr={0x83, 0x7, 0x3d, [@multicast1]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x24, 0x97, 0x1, 0x0, [{@multicast1, 0x2}, {@private=0xa010102, 0x9}, {@empty}, {@private=0xa010101, 0x1}]}, @ra={0x94, 0x4}, @noop, @rr={0x7, 0x2b, 0xdd, [@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0xf}, @loopback]}, @end]}}}}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x80800}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x80800, 0x0, 0xffffffffffffffff}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x1, 0x10}, 0xc) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x3, 0x1f, 0x34, 0x8001, 0x800, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x36}, @map_fd={0x18, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x380000, 0x0, &(0x7f0000000100), 0x40f00, 0x10, '\x00', r0, 0x1b, r1, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x2, 0x800, 0x5ed}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[r2, r3, r4, r5]}, 0x80) 00:12:24 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x10, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:24 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0xe, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:24 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) [ 744.243159][ T6056] ------------[ cut here ]------------ [ 744.244317][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 744.246149][ T6056] Modules linked in: [ 744.246987][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 744.249188][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 744.251259][ T6056] Workqueue: usb_hub_wq hub_event [ 744.252237][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) 00:12:24 executing program 2: r0 = fsmount(0xffffffffffffffff, 0x0, 0x72) ioctl$SIOCGETSGCNT(r0, 0x89e1, &(0x7f0000000000)={@rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x1, 0x0}}) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) [ 744.253849][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 744.254871][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 744.255885][ T6056] sp : ffff800097356580 [ 744.256724][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 744.258422][ T6056] x26: 0000000000000001 x25: 1fffe00019f90d19 x24: dfff800000000000 [ 744.260132][ T6056] x23: ffff700012e6acb0 x22: ffff0000cfc868e0 x21: ffff8000973565a0 [ 744.261890][ T6056] x20: 0000000000000001 x19: ffff0000cfc868c8 x18: 1fffe00036842bc6 [ 744.263601][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 744.265294][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 744.266915][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 744.268639][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 744.270290][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 744.272092][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 744.273802][ T6056] Call trace: [ 744.274469][ T6056] __flush_work+0x1b4/0x1c0 [ 744.275432][ T6056] __cancel_work_timer+0x3e4/0x540 [ 744.276471][ T6056] cancel_work_sync+0x24/0x38 [ 744.277457][ T6056] smsusb_term_device+0x98/0x1cc [ 744.278542][ T6056] smsusb_probe+0xcb8/0x1a0c [ 744.279519][ T6056] usb_probe_interface+0x500/0x984 [ 744.280641][ T6056] really_probe+0x394/0xa7c [ 744.281614][ T6056] __driver_probe_device+0x194/0x3b4 [ 744.282749][ T6056] driver_probe_device+0x78/0x330 [ 744.283820][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 744.284942][ T6056] bus_for_each_drv+0x228/0x2bc [ 744.285935][ T6056] __device_attach+0x2b4/0x434 [ 744.286958][ T6056] device_initial_probe+0x24/0x34 [ 744.288007][ T6056] bus_probe_device+0x178/0x240 [ 744.289002][ T6056] device_add+0xa44/0xdf0 [ 744.289941][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 744.291062][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 744.292253][ T6056] usb_probe_device+0x120/0x25c [ 744.293308][ T6056] really_probe+0x394/0xa7c [ 744.294229][ T6056] __driver_probe_device+0x194/0x3b4 [ 744.295339][ T6056] driver_probe_device+0x78/0x330 [ 744.296393][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 744.297552][ T6056] bus_for_each_drv+0x228/0x2bc [ 744.298600][ T6056] __device_attach+0x2b4/0x434 [ 744.299579][ T6056] device_initial_probe+0x24/0x34 [ 744.300679][ T6056] bus_probe_device+0x178/0x240 [ 744.301728][ T6056] device_add+0xa44/0xdf0 [ 744.302609][ T6056] usb_new_device+0x904/0x142c [ 744.303617][ T6056] hub_event+0x25e4/0x474c 00:12:24 executing program 2: fsmount(0xffffffffffffffff, 0x0, 0x72) (async) r0 = fsmount(0xffffffffffffffff, 0x0, 0x72) ioctl$SIOCGETSGCNT(r0, 0x89e1, &(0x7f0000000000)={@rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x1, 0x0}}) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) [ 744.304572][ T6056] process_one_work+0x788/0x12d4 [ 744.305634][ T6056] worker_thread+0xb68/0xfe8 [ 744.306617][ T6056] kthread+0x288/0x310 [ 744.307475][ T6056] ret_from_fork+0x10/0x20 [ 744.308420][ T6056] irq event stamp: 2615676 [ 744.309432][ T6056] hardirqs last enabled at (2615675): [] __cancel_work_timer+0x3a4/0x540 [ 744.311480][ T6056] hardirqs last disabled at (2615676): [] el1_dbg+0x24/0x80 [ 744.313367][ T6056] softirqs last enabled at (2615652): [] __do_softirq+0xac0/0xd54 [ 744.315317][ T6056] softirqs last disabled at (2615251): [] ____do_softirq+0x14/0x20 [ 744.317429][ T6056] ---[ end trace 0000000000000000 ]--- 00:12:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000140)={'tunl0\x00', 0x0, 0x700, 0x40, 0x101, 0x8, {{0x1d, 0x4, 0x1, 0x2, 0x74, 0x66, 0x0, 0x7e, 0x4, 0x0, @rand_addr=0x64010102, @empty, {[@lsrr={0x83, 0x7, 0x3d, [@multicast1]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x24, 0x97, 0x1, 0x0, [{@multicast1, 0x2}, {@private=0xa010102, 0x9}, {@empty}, {@private=0xa010101, 0x1}]}, @ra={0x94, 0x4}, @noop, @rr={0x7, 0x2b, 0xdd, [@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0xf}, @loopback]}, @end]}}}}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x80800, 0x0, 0xffffffffffffffff}) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x1, 0x10}, 0xc) (async) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x3, 0x1f, 0x34, 0x8001, 0x800, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) (async) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x36}, @map_fd={0x18, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x380000, 0x0, &(0x7f0000000100), 0x40f00, 0x10, '\x00', r0, 0x1b, r1, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x2, 0x800, 0x5ed}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[r2, r3, r4, r5]}, 0x80) 00:12:24 executing program 2: r0 = fsmount(0xffffffffffffffff, 0x0, 0x72) ioctl$SIOCGETSGCNT(r0, 0x89e1, &(0x7f0000000000)={@rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x1, 0x0}}) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x72) (async) ioctl$SIOCGETSGCNT(r0, 0x89e1, &(0x7f0000000000)={@rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x1, 0x0}}) (async) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) (async) [ 744.363834][ T6056] ------------[ cut here ]------------ [ 744.364918][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 744.366783][ T6056] Modules linked in: [ 744.367624][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 744.369905][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 744.372085][ T6056] Workqueue: usb_hub_wq hub_event [ 744.373190][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 744.374895][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 744.375858][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 744.376857][ T6056] sp : ffff800097356580 [ 744.377782][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 744.379353][ T6056] x26: 0000000000000001 x25: 1fffe00019f90d3d x24: dfff800000000000 [ 744.381020][ T6056] x23: ffff700012e6acb0 x22: ffff0000cfc86a00 x21: ffff8000973565a0 [ 744.382741][ T6056] x20: 0000000000000001 x19: ffff0000cfc869e8 x18: 1fffe00036842bc6 [ 744.384387][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 744.386109][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 744.387888][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 744.389482][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 744.391134][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 744.392743][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 744.394418][ T6056] Call trace: [ 744.395163][ T6056] __flush_work+0x1b4/0x1c0 [ 744.396104][ T6056] __cancel_work_timer+0x3e4/0x540 [ 744.397163][ T6056] cancel_work_sync+0x24/0x38 [ 744.398187][ T6056] smsusb_term_device+0x98/0x1cc [ 744.399221][ T6056] smsusb_probe+0xcb8/0x1a0c [ 744.400197][ T6056] usb_probe_interface+0x500/0x984 [ 744.401313][ T6056] really_probe+0x394/0xa7c [ 744.402365][ T6056] __driver_probe_device+0x194/0x3b4 [ 744.403524][ T6056] driver_probe_device+0x78/0x330 [ 744.404590][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 744.405780][ T6056] bus_for_each_drv+0x228/0x2bc [ 744.406896][ T6056] __device_attach+0x2b4/0x434 [ 744.407887][ T6056] device_initial_probe+0x24/0x34 [ 744.408987][ T6056] bus_probe_device+0x178/0x240 [ 744.410017][ T6056] device_add+0xa44/0xdf0 [ 744.410929][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 744.412044][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 744.413238][ T6056] usb_probe_device+0x120/0x25c [ 744.414235][ T6056] really_probe+0x394/0xa7c [ 744.415174][ T6056] __driver_probe_device+0x194/0x3b4 [ 744.416300][ T6056] driver_probe_device+0x78/0x330 [ 744.417346][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 744.418538][ T6056] bus_for_each_drv+0x228/0x2bc [ 744.419542][ T6056] __device_attach+0x2b4/0x434 [ 744.420580][ T6056] device_initial_probe+0x24/0x34 [ 744.421652][ T6056] bus_probe_device+0x178/0x240 [ 744.422681][ T6056] device_add+0xa44/0xdf0 [ 744.423579][ T6056] usb_new_device+0x904/0x142c [ 744.424613][ T6056] hub_event+0x25e4/0x474c [ 744.425514][ T6056] process_one_work+0x788/0x12d4 [ 744.426575][ T6056] worker_thread+0xb68/0xfe8 [ 744.427611][ T6056] kthread+0x288/0x310 [ 744.428481][ T6056] ret_from_fork+0x10/0x20 [ 744.429457][ T6056] irq event stamp: 2616214 [ 744.430333][ T6056] hardirqs last enabled at (2616213): [] __cancel_work_timer+0x3a4/0x540 [ 744.432567][ T6056] hardirqs last disabled at (2616214): [] el1_dbg+0x24/0x80 [ 744.434375][ T6056] softirqs last enabled at (2616192): [] __do_softirq+0xac0/0xd54 [ 744.436348][ T6056] softirqs last disabled at (2615679): [] ____do_softirq+0x14/0x20 [ 744.438309][ T6056] ---[ end trace 0000000000000000 ]--- [ 744.458367][ T6056] ------------[ cut here ]------------ [ 744.459531][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 744.461363][ T6056] Modules linked in: [ 744.462121][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 744.464361][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 744.466513][ T6056] Workqueue: usb_hub_wq hub_event [ 744.467599][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 744.469216][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 744.470195][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 744.471178][ T6056] sp : ffff800097356580 [ 744.471983][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 744.473638][ T6056] x26: 0000000000000001 x25: 1fffe00019f90d61 x24: dfff800000000000 [ 744.475295][ T6056] x23: ffff700012e6acb0 x22: ffff0000cfc86b20 x21: ffff8000973565a0 [ 744.476949][ T6056] x20: 0000000000000001 x19: ffff0000cfc86b08 x18: 1fffe00036842bc6 [ 744.478586][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff80008434df88 [ 744.480246][ T6056] x14: ffff800084358b64 x13: 0000000000000000 x12: 0000000000000001 [ 744.481832][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 744.483523][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 744.485199][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 744.486917][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 744.488536][ T6056] Call trace: [ 744.489174][ T6056] __flush_work+0x1b4/0x1c0 [ 744.490075][ T6056] __cancel_work_timer+0x3e4/0x540 [ 744.491114][ T6056] cancel_work_sync+0x24/0x38 [ 744.492056][ T6056] smsusb_term_device+0x98/0x1cc [ 744.493175][ T6056] smsusb_probe+0xcb8/0x1a0c [ 744.494113][ T6056] usb_probe_interface+0x500/0x984 [ 744.495202][ T6056] really_probe+0x394/0xa7c [ 744.496164][ T6056] __driver_probe_device+0x194/0x3b4 [ 744.497199][ T6056] driver_probe_device+0x78/0x330 [ 744.498276][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 744.499355][ T6056] bus_for_each_drv+0x228/0x2bc [ 744.500384][ T6056] __device_attach+0x2b4/0x434 [ 744.501365][ T6056] device_initial_probe+0x24/0x34 [ 744.502480][ T6056] bus_probe_device+0x178/0x240 [ 744.503516][ T6056] device_add+0xa44/0xdf0 [ 744.504436][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 744.505563][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 744.506674][ T6056] usb_probe_device+0x120/0x25c [ 744.507674][ T6056] really_probe+0x394/0xa7c [ 744.508623][ T6056] __driver_probe_device+0x194/0x3b4 [ 744.509755][ T6056] driver_probe_device+0x78/0x330 [ 744.510858][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 744.511929][ T6056] bus_for_each_drv+0x228/0x2bc [ 744.512953][ T6056] __device_attach+0x2b4/0x434 [ 744.513974][ T6056] device_initial_probe+0x24/0x34 [ 744.514981][ T6056] bus_probe_device+0x178/0x240 [ 744.515988][ T6056] device_add+0xa44/0xdf0 [ 744.516858][ T6056] usb_new_device+0x904/0x142c [ 744.517915][ T6056] hub_event+0x25e4/0x474c [ 744.518834][ T6056] process_one_work+0x788/0x12d4 [ 744.519848][ T6056] worker_thread+0xb68/0xfe8 [ 744.520743][ T6056] kthread+0x288/0x310 [ 744.521688][ T6056] ret_from_fork+0x10/0x20 [ 744.522695][ T6056] irq event stamp: 2616704 [ 744.523593][ T6056] hardirqs last enabled at (2616703): [] __cancel_work_timer+0x3a4/0x540 [ 744.525646][ T6056] hardirqs last disabled at (2616704): [] el1_dbg+0x24/0x80 [ 744.527430][ T6056] softirqs last enabled at (2616696): [] __do_softirq+0xac0/0xd54 [ 744.529361][ T6056] softirqs last disabled at (2616217): [] ____do_softirq+0x14/0x20 [ 744.531303][ T6056] ---[ end trace 0000000000000000 ]--- [ 744.538250][ T6056] smsusb:smsusb_probe: Device initialized with return code -19 [ 744.568915][ T6056] smsusb:smsusb_probe: board id=12, interface number 93 [ 744.608062][ T6056] smsusb:smsusb_probe: board id=12, interface number 212 [ 744.610733][ T6056] usb 1-1: USB disconnect, device number 88 [ 744.966708][ T6056] usb 1-1: new high-speed USB device number 89 using dummy_hcd [ 745.216730][ T6056] usb 1-1: Using ep0 maxpacket: 16 [ 745.336845][ T6056] usb 1-1: config 5 has an invalid interface number: 93 but max is 2 [ 745.338615][ T6056] usb 1-1: config 5 has an invalid interface number: 212 but max is 2 [ 745.340289][ T6056] usb 1-1: config 5 has no interface number 1 [ 745.341526][ T6056] usb 1-1: config 5 has no interface number 2 [ 745.342825][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0xC has invalid maxpacket 1023, setting to 64 [ 745.345029][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0x2, skipping [ 745.354157][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0x7 has invalid maxpacket 512, setting to 64 [ 745.356484][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0xB, skipping [ 745.358754][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0x1 has invalid maxpacket 1024, setting to 64 [ 745.361117][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0x2, skipping [ 745.363265][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has an invalid endpoint with address 0x80, skipping [ 745.365449][ T6056] usb 1-1: config 5 interface 93 altsetting 7 endpoint 0xA has invalid maxpacket 511, setting to 64 [ 745.373496][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0xB, skipping [ 745.375788][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0x1, skipping [ 745.378108][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has an invalid endpoint with address 0x0, skipping [ 745.380303][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0x9, skipping [ 745.382490][ T6056] usb 1-1: config 5 interface 0 has no altsetting 0 [ 745.383802][ T6056] usb 1-1: config 5 interface 93 has no altsetting 0 [ 745.385141][ T6056] usb 1-1: config 5 interface 212 has no altsetting 0 [ 745.536842][ T6056] usb 1-1: Dual-Role OTG device on HNP port [ 745.556742][ T6056] usb 1-1: New USB device found, idVendor=187f, idProduct=0302, bcdDevice= 8.17 [ 745.558719][ T6056] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 745.560312][ T6056] usb 1-1: Product: syz [ 745.561241][ T6056] usb 1-1: Manufacturer: syz [ 745.562155][ T6056] usb 1-1: SerialNumber: syz [ 745.571407][ T6056] usb 1-1: Interface #212 referenced by multiple IADs [ 745.918641][ T6056] smsusb:smsusb_probe: board id=12, interface number 0 [ 746.116761][ T6056] ------------[ cut here ]------------ [ 746.117936][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 746.119762][ T6056] Modules linked in: [ 746.120617][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 746.122900][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 746.124995][ T6056] Workqueue: usb_hub_wq hub_event [ 746.126023][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 746.127674][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 746.128688][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 746.129688][ T6056] sp : ffff800097356580 [ 746.130591][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 746.132221][ T6056] x26: 0000000000000001 x25: 1fffe0001b9d501d x24: dfff800000000000 [ 746.133842][ T6056] x23: ffff700012e6acb0 x22: ffff0000dcea8100 x21: ffff8000973565a0 [ 746.135398][ T6056] x20: 0000000000000001 x19: ffff0000dcea80e8 x18: 1fffe00036842bc6 [ 746.137055][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 746.138756][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 746.140552][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 746.142219][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 746.143852][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 746.145549][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 746.147103][ T6056] Call trace: [ 746.147761][ T6056] __flush_work+0x1b4/0x1c0 [ 746.148741][ T6056] __cancel_work_timer+0x3e4/0x540 [ 746.149768][ T6056] cancel_work_sync+0x24/0x38 [ 746.150739][ T6056] smsusb_term_device+0x98/0x1cc [ 746.151760][ T6056] smsusb_probe+0xcb8/0x1a0c [ 746.152684][ T6056] usb_probe_interface+0x500/0x984 [ 746.153766][ T6056] really_probe+0x394/0xa7c [ 746.154690][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.155762][ T6056] driver_probe_device+0x78/0x330 [ 746.156781][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.157891][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.158884][ T6056] __device_attach+0x2b4/0x434 [ 746.159817][ T6056] device_initial_probe+0x24/0x34 [ 746.160809][ T6056] bus_probe_device+0x178/0x240 [ 746.161816][ T6056] device_add+0xa44/0xdf0 [ 746.162738][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 746.163949][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 746.165135][ T6056] usb_probe_device+0x120/0x25c [ 746.166165][ T6056] really_probe+0x394/0xa7c [ 746.167060][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.168200][ T6056] driver_probe_device+0x78/0x330 [ 746.169249][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.170369][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.171375][ T6056] __device_attach+0x2b4/0x434 [ 746.172323][ T6056] device_initial_probe+0x24/0x34 [ 746.173380][ T6056] bus_probe_device+0x178/0x240 [ 746.174394][ T6056] device_add+0xa44/0xdf0 [ 746.175336][ T6056] usb_new_device+0x904/0x142c [ 746.176249][ T6056] hub_event+0x25e4/0x474c [ 746.177194][ T6056] process_one_work+0x788/0x12d4 [ 746.178159][ T6056] worker_thread+0xb68/0xfe8 [ 746.179122][ T6056] kthread+0x288/0x310 [ 746.179970][ T6056] ret_from_fork+0x10/0x20 [ 746.180843][ T6056] irq event stamp: 2629796 [ 746.181747][ T6056] hardirqs last enabled at (2629795): [] __cancel_work_timer+0x3a4/0x540 [ 746.183804][ T6056] hardirqs last disabled at (2629796): [] el1_dbg+0x24/0x80 [ 746.185641][ T6056] softirqs last enabled at (2625632): [] __do_softirq+0xac0/0xd54 [ 746.187589][ T6056] softirqs last disabled at (2625613): [] ____do_softirq+0x14/0x20 [ 746.189603][ T6056] ---[ end trace 0000000000000000 ]--- [ 746.195998][ T6056] ------------[ cut here ]------------ [ 746.197166][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 746.199002][ T6056] Modules linked in: [ 746.199798][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 746.202081][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 746.204133][ T6056] Workqueue: usb_hub_wq hub_event [ 746.205184][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 746.206864][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 746.207917][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 746.208981][ T6056] sp : ffff800097356580 [ 746.209790][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 746.211466][ T6056] x26: 0000000000000001 x25: 1fffe0001b9d5041 x24: dfff800000000000 [ 746.213185][ T6056] x23: ffff700012e6acb0 x22: ffff0000dcea8220 x21: ffff8000973565a0 [ 746.214842][ T6056] x20: 0000000000000001 x19: ffff0000dcea8208 x18: 1fffe00036842bc6 [ 746.216578][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 746.218190][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 746.219948][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 746.221651][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 746.223276][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 746.224944][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 746.226483][ T6056] Call trace: [ 746.227160][ T6056] __flush_work+0x1b4/0x1c0 [ 746.228088][ T6056] __cancel_work_timer+0x3e4/0x540 [ 746.229123][ T6056] cancel_work_sync+0x24/0x38 [ 746.230108][ T6056] smsusb_term_device+0x98/0x1cc [ 746.231176][ T6056] smsusb_probe+0xcb8/0x1a0c [ 746.232143][ T6056] usb_probe_interface+0x500/0x984 [ 746.233151][ T6056] really_probe+0x394/0xa7c [ 746.234095][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.235240][ T6056] driver_probe_device+0x78/0x330 [ 746.236360][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.237496][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.238521][ T6056] __device_attach+0x2b4/0x434 [ 746.239499][ T6056] device_initial_probe+0x24/0x34 [ 746.240571][ T6056] bus_probe_device+0x178/0x240 [ 746.241598][ T6056] device_add+0xa44/0xdf0 [ 746.242519][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 746.243729][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 746.244901][ T6056] usb_probe_device+0x120/0x25c [ 746.245907][ T6056] really_probe+0x394/0xa7c [ 746.246996][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.248053][ T6056] driver_probe_device+0x78/0x330 [ 746.249118][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.250247][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.251251][ T6056] __device_attach+0x2b4/0x434 [ 746.252235][ T6056] device_initial_probe+0x24/0x34 [ 746.253193][ T6056] bus_probe_device+0x178/0x240 [ 746.254182][ T6056] device_add+0xa44/0xdf0 [ 746.255087][ T6056] usb_new_device+0x904/0x142c [ 746.256107][ T6056] hub_event+0x25e4/0x474c [ 746.257049][ T6056] process_one_work+0x788/0x12d4 [ 746.258080][ T6056] worker_thread+0xb68/0xfe8 [ 746.259001][ T6056] kthread+0x288/0x310 [ 746.259838][ T6056] ret_from_fork+0x10/0x20 [ 746.260751][ T6056] irq event stamp: 2629838 [ 746.261613][ T6056] hardirqs last enabled at (2629837): [] __cancel_work_timer+0x3a4/0x540 [ 746.263673][ T6056] hardirqs last disabled at (2629838): [] el1_dbg+0x24/0x80 [ 746.265457][ T6056] softirqs last enabled at (2629830): [] __do_softirq+0xac0/0xd54 [ 746.267467][ T6056] softirqs last disabled at (2629799): [] ____do_softirq+0x14/0x20 [ 746.269405][ T6056] ---[ end trace 0000000000000000 ]--- [ 746.272256][ T6056] ------------[ cut here ]------------ [ 746.273392][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 746.275240][ T6056] Modules linked in: [ 746.276054][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 746.278332][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 746.280487][ T6056] Workqueue: usb_hub_wq hub_event [ 746.281637][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 746.283327][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 746.284331][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 746.285399][ T6056] sp : ffff800097356580 [ 746.286297][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 746.288012][ T6056] x26: 0000000000000001 x25: 1fffe0001b9d5065 x24: dfff800000000000 [ 746.289788][ T6056] x23: ffff700012e6acb0 x22: ffff0000dcea8340 x21: ffff8000973565a0 [ 746.291473][ T6056] x20: 0000000000000001 x19: ffff0000dcea8328 x18: 1fffe00036842bc6 [ 746.293227][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 746.294906][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 746.296547][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 746.298185][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 746.299904][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 746.301598][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 746.303274][ T6056] Call trace: [ 746.303935][ T6056] __flush_work+0x1b4/0x1c0 [ 746.304884][ T6056] __cancel_work_timer+0x3e4/0x540 [ 746.305921][ T6056] cancel_work_sync+0x24/0x38 [ 746.306877][ T6056] smsusb_term_device+0x98/0x1cc [ 746.307964][ T6056] smsusb_probe+0xcb8/0x1a0c [ 746.308911][ T6056] usb_probe_interface+0x500/0x984 [ 746.310057][ T6056] really_probe+0x394/0xa7c [ 746.311017][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.312130][ T6056] driver_probe_device+0x78/0x330 [ 746.313164][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.314295][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.315346][ T6056] __device_attach+0x2b4/0x434 [ 746.316286][ T6056] device_initial_probe+0x24/0x34 [ 746.317323][ T6056] bus_probe_device+0x178/0x240 [ 746.318293][ T6056] device_add+0xa44/0xdf0 [ 746.319210][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 746.320405][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 746.321559][ T6056] usb_probe_device+0x120/0x25c [ 746.322553][ T6056] really_probe+0x394/0xa7c [ 746.323488][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.324608][ T6056] driver_probe_device+0x78/0x330 [ 746.325654][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.326793][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.327863][ T6056] __device_attach+0x2b4/0x434 [ 746.328896][ T6056] device_initial_probe+0x24/0x34 [ 746.330034][ T6056] bus_probe_device+0x178/0x240 [ 746.331060][ T6056] device_add+0xa44/0xdf0 [ 746.332021][ T6056] usb_new_device+0x904/0x142c [ 746.333005][ T6056] hub_event+0x25e4/0x474c [ 746.333940][ T6056] process_one_work+0x788/0x12d4 [ 746.335027][ T6056] worker_thread+0xb68/0xfe8 [ 746.336011][ T6056] kthread+0x288/0x310 [ 746.336911][ T6056] ret_from_fork+0x10/0x20 [ 746.337848][ T6056] irq event stamp: 2630236 [ 746.338790][ T6056] hardirqs last enabled at (2630235): [] __cancel_work_timer+0x3a4/0x540 [ 746.340925][ T6056] hardirqs last disabled at (2630236): [] el1_dbg+0x24/0x80 [ 746.342726][ T6056] softirqs last enabled at (2630230): [] __do_softirq+0xac0/0xd54 [ 746.344895][ T6056] softirqs last disabled at (2630225): [] ____do_softirq+0x14/0x20 [ 746.346895][ T6056] ---[ end trace 0000000000000000 ]--- [ 746.349203][ T6056] ------------[ cut here ]------------ [ 746.350340][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 746.352155][ T6056] Modules linked in: [ 746.353026][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 746.355337][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 746.357450][ T6056] Workqueue: usb_hub_wq hub_event [ 746.358527][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 746.360156][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 746.361191][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 746.362267][ T6056] sp : ffff800097356580 [ 746.363164][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 746.364864][ T6056] x26: 0000000000000001 x25: 1fffe0001b9d5089 x24: dfff800000000000 [ 746.366542][ T6056] x23: ffff700012e6acb0 x22: ffff0000dcea8460 x21: ffff8000973565a0 [ 746.368258][ T6056] x20: 0000000000000001 x19: ffff0000dcea8448 x18: 1fffe00036842bc6 [ 746.370038][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 746.371700][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 746.373332][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 746.374908][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 746.376547][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 746.378337][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 746.379940][ T6056] Call trace: [ 746.380598][ T6056] __flush_work+0x1b4/0x1c0 [ 746.381494][ T6056] __cancel_work_timer+0x3e4/0x540 [ 746.382598][ T6056] cancel_work_sync+0x24/0x38 [ 746.383635][ T6056] smsusb_term_device+0x98/0x1cc [ 746.384646][ T6056] smsusb_probe+0xcb8/0x1a0c [ 746.385533][ T6056] usb_probe_interface+0x500/0x984 [ 746.386625][ T6056] really_probe+0x394/0xa7c [ 746.387576][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.388711][ T6056] driver_probe_device+0x78/0x330 [ 746.389802][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.390879][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.391871][ T6056] __device_attach+0x2b4/0x434 [ 746.392837][ T6056] device_initial_probe+0x24/0x34 [ 746.393910][ T6056] bus_probe_device+0x178/0x240 [ 746.394930][ T6056] device_add+0xa44/0xdf0 [ 746.395906][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 746.397071][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 746.398237][ T6056] usb_probe_device+0x120/0x25c [ 746.399210][ T6056] really_probe+0x394/0xa7c [ 746.400160][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.401270][ T6056] driver_probe_device+0x78/0x330 [ 746.402315][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.403441][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.404446][ T6056] __device_attach+0x2b4/0x434 [ 746.405447][ T6056] device_initial_probe+0x24/0x34 [ 746.406522][ T6056] bus_probe_device+0x178/0x240 [ 746.407531][ T6056] device_add+0xa44/0xdf0 [ 746.408436][ T6056] usb_new_device+0x904/0x142c [ 746.409512][ T6056] hub_event+0x25e4/0x474c [ 746.410424][ T6056] process_one_work+0x788/0x12d4 [ 746.411424][ T6056] worker_thread+0xb68/0xfe8 [ 746.412324][ T6056] kthread+0x288/0x310 [ 746.413211][ T6056] ret_from_fork+0x10/0x20 [ 746.414100][ T6056] irq event stamp: 2630288 [ 746.415039][ T6056] hardirqs last enabled at (2630287): [] __cancel_work_timer+0x3a4/0x540 [ 746.417218][ T6056] hardirqs last disabled at (2630288): [] el1_dbg+0x24/0x80 [ 746.419001][ T6056] softirqs last enabled at (2630280): [] __do_softirq+0xac0/0xd54 [ 746.420964][ T6056] softirqs last disabled at (2630239): [] ____do_softirq+0x14/0x20 [ 746.422958][ T6056] ---[ end trace 0000000000000000 ]--- [ 746.425089][ T6056] ------------[ cut here ]------------ [ 746.426171][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 746.428032][ T6056] Modules linked in: [ 746.428822][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 746.431154][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 746.433215][ T6056] Workqueue: usb_hub_wq hub_event [ 746.434281][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 746.435895][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 746.436903][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 746.437885][ T6056] sp : ffff800097356580 [ 746.438737][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 746.440316][ T6056] x26: 0000000000000001 x25: 1fffe0001b9d50ad x24: dfff800000000000 [ 746.441934][ T6056] x23: ffff700012e6acb0 x22: ffff0000dcea8580 x21: ffff8000973565a0 [ 746.443528][ T6056] x20: 0000000000000001 x19: ffff0000dcea8568 x18: 1fffe00036842bc6 [ 746.445152][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 746.446905][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 746.448634][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 746.450316][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 746.451988][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 746.453675][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 746.455343][ T6056] Call trace: [ 746.456005][ T6056] __flush_work+0x1b4/0x1c0 [ 746.456887][ T6056] __cancel_work_timer+0x3e4/0x540 [ 746.457948][ T6056] cancel_work_sync+0x24/0x38 [ 746.458886][ T6056] smsusb_term_device+0x98/0x1cc [ 746.459979][ T6056] smsusb_probe+0xcb8/0x1a0c [ 746.460947][ T6056] usb_probe_interface+0x500/0x984 [ 746.462060][ T6056] really_probe+0x394/0xa7c [ 746.462987][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.464038][ T6056] driver_probe_device+0x78/0x330 [ 746.465110][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.466248][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.467249][ T6056] __device_attach+0x2b4/0x434 [ 746.468225][ T6056] device_initial_probe+0x24/0x34 [ 746.469270][ T6056] bus_probe_device+0x178/0x240 [ 746.470236][ T6056] device_add+0xa44/0xdf0 [ 746.471158][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 746.472239][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 746.473367][ T6056] usb_probe_device+0x120/0x25c [ 746.474383][ T6056] really_probe+0x394/0xa7c [ 746.475302][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.476349][ T6056] driver_probe_device+0x78/0x330 [ 746.477462][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.478566][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.479633][ T6056] __device_attach+0x2b4/0x434 [ 746.480681][ T6056] device_initial_probe+0x24/0x34 [ 746.481752][ T6056] bus_probe_device+0x178/0x240 [ 746.482760][ T6056] device_add+0xa44/0xdf0 [ 746.483659][ T6056] usb_new_device+0x904/0x142c [ 746.484683][ T6056] hub_event+0x25e4/0x474c [ 746.485639][ T6056] process_one_work+0x788/0x12d4 [ 746.486640][ T6056] worker_thread+0xb68/0xfe8 [ 746.487607][ T6056] kthread+0x288/0x310 [ 746.488414][ T6056] ret_from_fork+0x10/0x20 [ 746.489352][ T6056] irq event stamp: 2630704 [ 746.490210][ T6056] hardirqs last enabled at (2630703): [] __cancel_work_timer+0x3a4/0x540 [ 746.492259][ T6056] hardirqs last disabled at (2630704): [] el1_dbg+0x24/0x80 [ 746.494021][ T6056] softirqs last enabled at (2630696): [] __do_softirq+0xac0/0xd54 [ 746.495968][ T6056] softirqs last disabled at (2630293): [] ____do_softirq+0x14/0x20 [ 746.497972][ T6056] ---[ end trace 0000000000000000 ]--- [ 746.499350][ T6056] ------------[ cut here ]------------ [ 746.500419][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 746.502272][ T6056] Modules linked in: [ 746.503049][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 746.505334][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 746.507375][ T6056] Workqueue: usb_hub_wq hub_event [ 746.508369][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 746.509981][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 746.511015][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 746.512040][ T6056] sp : ffff800097356580 [ 746.512933][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 746.514705][ T6056] x26: 0000000000000001 x25: 1fffe0001b9d50d1 x24: dfff800000000000 [ 746.516453][ T6056] x23: ffff700012e6acb0 x22: ffff0000dcea86a0 x21: ffff8000973565a0 [ 746.518081][ T6056] x20: 0000000000000001 x19: ffff0000dcea8688 x18: 1fffe00036842bc6 [ 746.519738][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 746.521428][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 746.523054][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 746.524681][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 746.526310][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 746.527983][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 746.529602][ T6056] Call trace: [ 746.530248][ T6056] __flush_work+0x1b4/0x1c0 [ 746.531208][ T6056] __cancel_work_timer+0x3e4/0x540 [ 746.532261][ T6056] cancel_work_sync+0x24/0x38 [ 746.533170][ T6056] smsusb_term_device+0x98/0x1cc [ 746.534200][ T6056] smsusb_probe+0xcb8/0x1a0c [ 746.535169][ T6056] usb_probe_interface+0x500/0x984 [ 746.536231][ T6056] really_probe+0x394/0xa7c [ 746.537175][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.538196][ T6056] driver_probe_device+0x78/0x330 [ 746.539189][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.540334][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.541388][ T6056] __device_attach+0x2b4/0x434 [ 746.542351][ T6056] device_initial_probe+0x24/0x34 [ 746.543390][ T6056] bus_probe_device+0x178/0x240 [ 746.544433][ T6056] device_add+0xa44/0xdf0 00:12:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) r1 = syz_usb_connect(0x3, 0xc09, &(0x7f0000000b40)={{0x12, 0x1, 0x110, 0x6d, 0x9b, 0xc0, 0x10, 0x187f, 0x302, 0x817, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xbf7, 0x3, 0x5, 0xe1, 0x90, 0x5, [{{0x9, 0x4, 0x0, 0x5, 0xd, 0xb6, 0x6b, 0x54, 0x13, [@generic={0xe2, 0x23, "7a135dc100e8e7cc0545b933efe6186650fa4d6ff8ff9fc6d10c134a23bfbb74887d4aa605f5c5d4830b8e73d1077874aa7f91199d1556a5ed06dcde8c52af76321c341be3d7f1191b9ae487d9bedc3c24ee98fff2cbcfdc58240ece44e8b1460632e4385af1ec2e0fde5bae7172a44c018cf0ea7e1b37814f0b6fd97021b0c20f4e0cd845f7a1a64a146e7c35e6bf2ea0b26297cedeabe910d0fce966ac5ad60179ef7591dc8a65ab0f543e997d4eab639c302a73287b25af116698ffe04f1badac7fbf39321b595db550da19b44380cc29ccabe8229201c7341b8fee337e4d"}], [{{0x9, 0x5, 0x3, 0x0, 0x20, 0xff, 0x92, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xad, 0x1}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x0, 0x9}]}}, {{0x9, 0x5, 0x6, 0x1, 0x200, 0x9, 0x0, 0x9, [@generic={0x8b, 0xa, "9d57533c1ba63b12a5ff9df5b4b9750ed4eef8ce0d29cb07bdafc6a6fedb6d77d5e1e88fa00238f71708e72c3ae09b23573789cb02e3586b68def0ca1cb058469af9216d4af47f8d1e751312387dd73ac2b604640f37c7a97ab70efdcebd398796a8da1f73a489b754e83716d744d13150c8a14c0f7ec50644ac0c4705d6d3df4b66262168cd15cee4"}]}}, {{0x9, 0x5, 0xc, 0x0, 0x3ff, 0x0, 0x3, 0xc, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x5, 0x3}]}}, {{0x9, 0x5, 0x2, 0x4, 0x28, 0x0, 0x40, 0x40, [@generic={0x2d, 0x31, "4b019e17c14610a75bba08075ba34f680fa01804b12180ea718c3d6ca26ca189829eff3cbb86c68858f8ae"}, @generic={0xb3, 0xb, "8c7b81e6fbeba6e961044b82ca11b41e3ed227e77801e489384134008c874cb5e1e3374b3cce73b8feaa6fe2188c1140e3ee90a1e608079eb6ab1569ace1d4a8fb2cde9b9535081b7e6c753079a2d2046e98274f410ac0e9520f1fcdd2df89a3adee4fea425b814de64f097f7765b2481b9ae6a5ad330f60039736d04df527a5b36143d7c1b8c747d8078a2435e2abaaa47f2cfa88bace765beec113e192b7014f8e0c24ba9e9f647a5c399d92757b1e72"}]}}, {{0x9, 0x5, 0xb, 0x10, 0x8, 0x4, 0x0, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x9}]}}, {{0x9, 0x5, 0x2, 0x10, 0x20, 0x20, 0x0, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x5, 0x3}]}}, {{0x9, 0x5, 0x7, 0x4, 0x200, 0x4, 0x8, 0x9, [@generic={0xe0, 0x10, "07f49d639f75d400d6abe0771d265ca87ba6d6995670761d98bb81a56c47828afe3e4f344aa778938ceb36678b36b0cf53bf5e4696853b7def97dacf969eec79c580987120676338746f3a5fe04b04042573709aca6e6993e7bb7c9042781e19c282e9515d4a505c1b86dab3c7578d9eff062562eb7020c5c0cd47720881fce52bf447db4ec6d4485c4b03deb6350d2f65c95fea9fbc12a8934aa434596dcaae56712fb690a17d68e71d2ac377fab9f7717ea5dbbc0a0dbf48c859b30f658323c572f507e020973f10c070b4aa0ba9cb1e0dce42e014c5e5cdcac2004cc7"}]}}, {{0x9, 0x5, 0xb, 0x8, 0x10, 0x3f, 0x7, 0x81, [@generic={0xdd, 0x24, "9bfde775d18e5240467003251666c37b63ecf76d83b51941878dcae90135f728bd954117607e9d0703707efca1c8d16536ac4b8b02ccce1f36f4128365b037f7a98365f8f37c9907bde723b02d5db3113a58296f01ef1f85a30bc11facff51510c2f007784115330ad0ae44a22885aa93892680b3aae2aa5a886a7e1314bed5610a447f26eab10d7c7ea6e344501c5daec8882d6354bf482d32bac5cb2e3c60d36ab58845a819ad5c9693b197553d69e293f4b6ff3c4d5de3ea409b2bb46008aca955aa97239a502f74684e1a196ef75132780bbaeec91f60ff9b0"}]}}, {{0x9, 0x5, 0x5, 0x0, 0x10, 0x20, 0x80, 0x3, [@generic={0xd9, 0xb, "aca4fa4252d9ed94294cf72d77e1acb265500fc4cfda6409078e8d237d15fba5e6301f3ac2835dc96ba8147ce6f2333e065bb99f211b00d266aa790b2c82fe9be07397447db4411aa1d7b0b7b436cc4a6d911787a8c8217f8844ff4db722fa17b0b02d2a45add096a2ca67699b53d6eba77da61d104092f89df48c6f4960d78ef3e00afc9726e49231de367635f0aa33ed95dfc5e10685e06d65d7e7f9c69a37fb54ebbb4aa48653621e2fb082255461d7a514eb6b16fd2b17418755dbf73c27fb7390a88a799f89a69632a7b1c26c62763ab6206a4080"}]}}, {{0x9, 0x5, 0x1, 0x10, 0x400, 0x6, 0x1f, 0x1, [@generic={0xa7, 0x21, "14811a29c5ae1d9910c328e6c77cb2b6d3d558f684f1a8b7b1ba8b1a33a0a48fcf1bf2e9d7b39385e84fd58f4a18b3123759428be33d86fbf505088d455d16326a64df0419df3c331b93f7b85a30ed125322b01eaa450db7698a44cc0a05cf33198561962968485406e815fb0868f08c6a16b37a9d5e03a81eb0df5fee57246db3689f927b9380e894069cad4796691cf02e381ac60e3b3f6b0cc865461b8644619b276ce8"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x5, 0x1000}]}}, {{0x9, 0x5, 0x9, 0x4, 0x40, 0x8, 0x22, 0x1f, [@generic={0xa6, 0xc, "f39e187d06bd2c24cb7a17470178ae886bd270ca5246b031140c7dc39b59a1b8c49fb3f9312b9df72a79096f9a017d89d5f0c7eeee68090487fec50521bb698e1c59814f87036124f3301d2ae6297071b1e25feada1341973b66865a11648613bcdebe40c78646de0604f93ca6e8f621fad79012739775e530b1f3174accf9cb00c70957ea07f9bb6431603351c76190670d498fb95818d6c37a040ff67db0e82baf2083"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x408, 0x8, 0x5, 0x8, [@generic={0x66, 0x31, "c48884bd4e099a7a00cdf4c68eda2f87bf1edd37f52cd990b7e59fc26bd60ab5c59455c46016f13b47502646c4ad549dd20613e6830d2b505a85add960a74e06096b1e3e01fad59a60e0e2ca0a23dd19008a9e4616080e28a420b1215659801217c3627e"}]}}, {{0x9, 0x5, 0x80, 0x8, 0x3ff, 0x0, 0x42, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x8, 0x5}, @generic={0xc0, 0x23, "bb6a114ac086aeab845a9dcbf82da6ce1da151c285b8b20f9cc185d697d205c321e2537a3ec0dc14a1a8ed660d92b8222ed6f2730feca67f8327eb6d799a3e8d6a9dca9e74b20eb60bcd7f6d7cce6dc09405d83c5b7cc35eeb5dc8b5cb0f4f1b0cbc5cacfb5c00a9ecb6f032a4cbea22f2dd9148c49dc831a26d2d6889d2253ba72f2d6dab1b3f06723e92da2126200190f1a3f0d1c400d3c1d0297c3757ce9488e1ec1a3df18958a1bac48938932215c3dda45526da9990e22cac6400c4"}]}}]}}, {{0x9, 0x4, 0x5d, 0x7, 0x2, 0xff, 0x4, 0x6a, 0x0, [@cdc_ncm={{0x9, 0x24, 0x6, 0x0, 0x1, "1c3ecb34"}, {0x5, 0x24, 0x0, 0xc3}, {0xd, 0x24, 0xf, 0x1, 0x3, 0x7fff, 0x80, 0x6}, {0x6, 0x24, 0x1a, 0xfff, 0x9}, [@mdlm={0x15, 0x24, 0x12, 0x1}, @mdlm={0x15, 0x24, 0x12, 0x4}]}, @hid_hid={0x9, 0x21, 0x3ff, 0xa8, 0x1, {0x22, 0x8e1}}], [{{0x9, 0x5, 0xa, 0x0, 0x1ff, 0x8, 0x9, 0x2, [@generic={0xb8, 0x8, "9f46b267cb58a7c1fa16ff61167d9d2369f58b1558c2c37a6a37b3c268d2da094168472bea1583a16a91e4d25e25418bff3e2e0b798e27602f5acf670328aea1daa77846d357aa9133fc204a05909eb4e0d192d75733d8562783ce1beaf39104e319af5f57deebc72765ceb88693fbd642b77258c958e8b9a47f3a729d8714d6e955b5dd9588f73aa391ed95de7ec10df48b6f19a838c38d3fa101692300f9000658e4783e6b70dd8bc6efd13c9763ae2300f717ddd2"}, @generic={0x3b, 0x9, "77c55219d510f22748060924fc9aa3c551fc47663a5e7ed83c2529fe1c65e2c2b09a22e2fded72ccafcb0f2b1f06bc6208fc1136c2aa175eea"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x8, 0x0, 0x2, 0x7f, [@generic={0x73, 0x31, "1bc282f8d117622ad1a0b701b02987fcefd6f13fc54d192d0fc7ae1201f01a04d0713dfbefe000b24ce416470e95ddfdc78ffc0801eafc576bd731301f605d434b3c57c2ec4ab03cd23cc30e230bfaf26ef10ec785dac881e2e102c40c5451f98a0960b6c068825ef779ca08eac2dbcb9f"}]}}]}}, {{0x9, 0x4, 0xd4, 0x1, 0x4, 0xe0, 0xa0, 0xb3, 0x9, [@hid_hid={0x9, 0x21, 0x0, 0x6, 0x1, {0x22, 0xcd2}}], [{{0x9, 0x5, 0xb, 0x0, 0x10, 0x3f, 0x7f, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x49, 0x5}]}}, {{0x9, 0x5, 0x1, 0x6, 0x8, 0x56, 0x2, 0x40, [@generic={0xba, 0x7, "e87340d296e8079cf3e731e2664ef4ad6999e19ab5656098ad33c34293721a854af5158b07f18bc5c1f6f0e40415efa10c7f33d2977f69e03d8d1141f258cf46f8f6c993910f86d7f11008453ff6711600485c0fa031afbe3630d9f21a765ca562b9f4e6563f3b522bfe86888d42aeb5d7c4e8d1c64310acccf6856676e635cce92ea242c0a6b0697108f2681a1caa33a364b23005ac20f32ae04af7e57092456512bb744aaddcbc6cfb93b924d095eead0bbe058969d640"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x3, 0x8001}]}}, {{0x9, 0x5, 0x0, 0x4, 0x3ff, 0x6, 0x1, 0xff, [@generic={0x31, 0x24, "f421d3d35748dccbcfda43aa3a8f0860a1aa51a2dc3ccbcdc9e800eb0624b0be188f1b3037ec8b4a8e512febdde11c"}]}}, {{0x9, 0x5, 0x9, 0x10, 0x44c, 0x81, 0x8, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xfc, 0x1}, @generic={0xde, 0x2f, "092caeb0108a3184a6168a36eaf452d75bdff776807bb7a70ae41e824272f29580b817874618e4392fac659c2d5c18f8255a00aa5528bccf9d27ff0524877f19807a1e9eb4173f86fc759098ce0a4bb7420e5f9b8338c5b56ac348553df30aefbf639c7e5257e635cc4a0a283ce3b42557e5365de92e82132b5b9e4ab3f5ac9e2235262535d8e8ba7b6d6301bca94b6c4f8ceba8369962bfc1be95053d2c9aba7367386a9c92e826d6a54cf3edff9abb0acbabc2db6548003cac4bf644304590d3f74cf38b51db4c38fdd0a5c42acc57dbb14bbb97f3cee13ce9db90"}]}}]}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x110, 0xb7, 0x8, 0xe0, 0x10, 0x9}, 0x5d, &(0x7f0000000340)={0x5, 0xf, 0x5d, 0x6, [@wireless={0xb, 0x10, 0x1, 0x2, 0x4, 0x1f, 0x1, 0x1, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "bb06cedd1b4e28ff4c1a21b2ce1e8892"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x9, 0x9, 0x1, 0x80}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0xa, 0xb, 0x1f}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "f6cac795c53a73ed6a93ea94bf96be2a"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "18b321f66d2fdfc4b1955ba406f93a82"}]}, 0x1, [{0xbd, &(0x7f00000003c0)=@string={0xbd, 0x3, "f342dee56c73e334ac155b8d1a9816b9ab6651172fa0470aea9399febc1eee2aae09949862c2a825e6246b98fa0e4512584891cce4e0f767848a82d2470be4fbd1ebc1cb5dc09d98580a582584baa75c156f72345ae5d5eabbef957bed4c7e6177b705e4faf688ac8b0acceff768cd2cdcf23e024d75043a297465687d82cbd67f4d3bf57d8b79c1d50a56fff74fdc1237579701b4d1f679129e55d7573be3d7c6b7123612e7732dd51b314b2eb612f7a53df55139610f93028f47"}}]}) syz_usb_disconnect(r1) getsockopt$MRT(r0, 0x0, 0xcf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x9, 0x20, 0x10, "210272cb635dcaffeeb6679d02e9ea99b5b0df2a89fffffffffffffffb0dee3e68f686391e2d5eebf58a18fcae1ea91ad44cc7af5ae033955c1ad11784240fb1", "a54164365100000800435981500000b91bfe62dcf1a701c7986bf133d4db87539b86094d2f2faa5800", "899402ba9dc4c7b342af83749819d201d80fb05e6117d7c7dfed0a6f3068cffb", [0xfffffffffffffffa, 0xa6e]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)={0x0, 0x0, 0x18}, 0x10) syz_open_dev$loop(&(0x7f0000000100), 0x88d9, 0x40000) 00:12:26 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xfffffffffffffd95) 00:12:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000200)=[0x0], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0xffffffffffffffff, 0x4, 0x1c}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="8521000004000000852000008dfa61861eafe59e0400000006167f00ffffff7f"], &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x61, &(0x7f0000000100)=""/97, 0x0, 0x8, '\x00', 0x0, 0x1c, r0, 0x8, &(0x7f0000000180)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xf, 0x7, 0x700}, 0x10, 0x2263d, r1, 0x0, &(0x7f00000002c0)=[0x1, r2, r3, r4, r5, r6]}, 0x80) 00:12:26 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:26 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x11, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:26 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0xe, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) [ 746.545305][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 746.546415][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 746.547726][ T6056] usb_probe_device+0x120/0x25c [ 746.548810][ T6056] really_probe+0x394/0xa7c [ 746.549757][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.550926][ T6056] driver_probe_device+0x78/0x330 [ 746.552010][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.553174][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.554172][ T6056] __device_attach+0x2b4/0x434 [ 746.555178][ T6056] device_initial_probe+0x24/0x34 [ 746.556257][ T6056] bus_probe_device+0x178/0x240 [ 746.557392][ T6056] device_add+0xa44/0xdf0 [ 746.558343][ T6056] usb_new_device+0x904/0x142c [ 746.559391][ T6056] hub_event+0x25e4/0x474c [ 746.560295][ T6056] process_one_work+0x788/0x12d4 [ 746.561442][ T6056] worker_thread+0xb68/0xfe8 [ 746.562464][ T6056] kthread+0x288/0x310 [ 746.563299][ T6056] ret_from_fork+0x10/0x20 [ 746.564248][ T6056] irq event stamp: 2630772 [ 746.565148][ T6056] hardirqs last enabled at (2630771): [] __cancel_work_timer+0x3a4/0x540 [ 746.567336][ T6056] hardirqs last disabled at (2630772): [] el1_dbg+0x24/0x80 [ 746.569172][ T6056] softirqs last enabled at (2630764): [] __do_softirq+0xac0/0xd54 [ 746.571197][ T6056] softirqs last disabled at (2630707): [] ____do_softirq+0x14/0x20 [ 746.573190][ T6056] ---[ end trace 0000000000000000 ]--- [ 746.596783][ T6056] ------------[ cut here ]------------ [ 746.597899][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 746.599651][ T6056] Modules linked in: [ 746.600395][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 00:12:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) (async) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) (async, rerun: 32) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) (rerun: 32) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) (async, rerun: 64) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) (rerun: 64) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000200)=[0x0], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) (async, rerun: 32) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) (async) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0xffffffffffffffff, 0x4, 0x1c}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="8521000004000000852000008dfa61861eafe59e0400000006167f00ffffff7f"], &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x61, &(0x7f0000000100)=""/97, 0x0, 0x8, '\x00', 0x0, 0x1c, r0, 0x8, &(0x7f0000000180)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xf, 0x7, 0x700}, 0x10, 0x2263d, r1, 0x0, &(0x7f00000002c0)=[0x1, r2, r3, r4, r5, r6]}, 0x80) [ 746.602576][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 746.604761][ T6056] Workqueue: usb_hub_wq hub_event [ 746.605761][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 746.607342][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 746.608398][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 746.609448][ T6056] sp : ffff800097356580 [ 746.610310][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 746.612015][ T6056] x26: 0000000000000001 x25: 1fffe0001b9d50f5 x24: dfff800000000000 [ 746.613696][ T6056] x23: ffff700012e6acb0 x22: ffff0000dcea87c0 x21: ffff8000973565a0 [ 746.615424][ T6056] x20: 0000000000000001 x19: ffff0000dcea87a8 x18: 1fffe00036842bc6 [ 746.617161][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 746.618824][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 746.620620][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 746.622226][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 746.623950][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 746.625708][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 746.627385][ T6056] Call trace: [ 746.628075][ T6056] __flush_work+0x1b4/0x1c0 [ 746.629006][ T6056] __cancel_work_timer+0x3e4/0x540 [ 746.630091][ T6056] cancel_work_sync+0x24/0x38 [ 746.631128][ T6056] smsusb_term_device+0x98/0x1cc [ 746.632175][ T6056] smsusb_probe+0xcb8/0x1a0c [ 746.633185][ T6056] usb_probe_interface+0x500/0x984 [ 746.634341][ T6056] really_probe+0x394/0xa7c [ 746.635326][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.636478][ T6056] driver_probe_device+0x78/0x330 [ 746.637542][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.638761][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.639759][ T6056] __device_attach+0x2b4/0x434 [ 746.640840][ T6056] device_initial_probe+0x24/0x34 [ 746.641914][ T6056] bus_probe_device+0x178/0x240 [ 746.643063][ T6056] device_add+0xa44/0xdf0 [ 746.644035][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 746.645196][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 746.646373][ T6056] usb_probe_device+0x120/0x25c [ 746.647482][ T6056] really_probe+0x394/0xa7c [ 746.648412][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.649567][ T6056] driver_probe_device+0x78/0x330 [ 746.650715][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.651923][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.652956][ T6056] __device_attach+0x2b4/0x434 [ 746.654009][ T6056] device_initial_probe+0x24/0x34 [ 746.655103][ T6056] bus_probe_device+0x178/0x240 [ 746.656162][ T6056] device_add+0xa44/0xdf0 [ 746.657129][ T6056] usb_new_device+0x904/0x142c [ 746.658145][ T6056] hub_event+0x25e4/0x474c [ 746.659117][ T6056] process_one_work+0x788/0x12d4 [ 746.660219][ T6056] worker_thread+0xb68/0xfe8 [ 746.661255][ T6056] kthread+0x288/0x310 [ 746.662080][ T6056] ret_from_fork+0x10/0x20 [ 746.663077][ T6056] irq event stamp: 2631188 [ 746.664092][ T6056] hardirqs last enabled at (2631187): [] __cancel_work_timer+0x3a4/0x540 [ 746.666192][ T6056] hardirqs last disabled at (2631188): [] el1_dbg+0x24/0x80 [ 746.668134][ T6056] softirqs last enabled at (2631172): [] __do_softirq+0xac0/0xd54 [ 746.670214][ T6056] softirqs last disabled at (2630775): [] ____do_softirq+0x14/0x20 [ 746.672347][ T6056] ---[ end trace 0000000000000000 ]--- 00:12:26 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xfffffffffffffd95) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xfffffffffffffd95) (async) 00:12:26 executing program 2: bpf$MAP_DELETE_BATCH(0x12, 0x0, 0xfffffffffffffd95) [ 746.716074][ T6056] ------------[ cut here ]------------ [ 746.717247][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 746.719160][ T6056] Modules linked in: [ 746.719955][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 746.722350][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 746.724476][ T6056] Workqueue: usb_hub_wq hub_event [ 746.725485][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 746.727098][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 746.728116][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 746.729082][ T6056] sp : ffff800097356580 [ 746.729938][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 746.731568][ T6056] x26: 0000000000000001 x25: 1fffe0001b9d5119 x24: dfff800000000000 [ 746.733169][ T6056] x23: ffff700012e6acb0 x22: ffff0000dcea88e0 x21: ffff8000973565a0 [ 746.734841][ T6056] x20: 0000000000000001 x19: ffff0000dcea88c8 x18: 1fffe00036842bc6 [ 746.736603][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 746.738213][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 746.739783][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 746.741451][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 746.742991][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 746.744639][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 746.746353][ T6056] Call trace: [ 746.747052][ T6056] __flush_work+0x1b4/0x1c0 [ 746.748019][ T6056] __cancel_work_timer+0x3e4/0x540 [ 746.749040][ T6056] cancel_work_sync+0x24/0x38 [ 746.749984][ T6056] smsusb_term_device+0x98/0x1cc [ 746.751039][ T6056] smsusb_probe+0xcb8/0x1a0c [ 746.752013][ T6056] usb_probe_interface+0x500/0x984 [ 746.753062][ T6056] really_probe+0x394/0xa7c [ 746.754006][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.755090][ T6056] driver_probe_device+0x78/0x330 [ 746.756108][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.757215][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.758240][ T6056] __device_attach+0x2b4/0x434 [ 746.759206][ T6056] device_initial_probe+0x24/0x34 [ 746.760263][ T6056] bus_probe_device+0x178/0x240 [ 746.761289][ T6056] device_add+0xa44/0xdf0 [ 746.762238][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 746.763386][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 746.764462][ T6056] usb_probe_device+0x120/0x25c [ 746.765476][ T6056] really_probe+0x394/0xa7c [ 746.766381][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.767460][ T6056] driver_probe_device+0x78/0x330 [ 746.768455][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.769563][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.770518][ T6056] __device_attach+0x2b4/0x434 [ 746.771587][ T6056] device_initial_probe+0x24/0x34 [ 746.772636][ T6056] bus_probe_device+0x178/0x240 [ 746.773638][ T6056] device_add+0xa44/0xdf0 [ 746.774533][ T6056] usb_new_device+0x904/0x142c [ 746.775547][ T6056] hub_event+0x25e4/0x474c [ 746.776448][ T6056] process_one_work+0x788/0x12d4 [ 746.777564][ T6056] worker_thread+0xb68/0xfe8 [ 746.778513][ T6056] kthread+0x288/0x310 [ 746.779320][ T6056] ret_from_fork+0x10/0x20 [ 746.780284][ T6056] irq event stamp: 2631670 [ 746.781245][ T6056] hardirqs last enabled at (2631669): [] __cancel_work_timer+0x3a4/0x540 [ 746.783349][ T6056] hardirqs last disabled at (2631670): [] el1_dbg+0x24/0x80 [ 746.785160][ T6056] softirqs last enabled at (2631660): [] __do_softirq+0xac0/0xd54 [ 746.787119][ T6056] softirqs last disabled at (2631261): [] ____do_softirq+0x14/0x20 [ 746.789093][ T6056] ---[ end trace 0000000000000000 ]--- 00:12:26 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0x6b}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000080)={0x0, 0x8}, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000000)) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) 00:12:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) (async) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) (async) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r3) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000200)=[0x0], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) (async) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r5) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0xffffffffffffffff, 0x4, 0x1c}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="8521000004000000852000008dfa61861eafe59e0400000006167f00ffffff7f"], &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x61, &(0x7f0000000100)=""/97, 0x0, 0x8, '\x00', 0x0, 0x1c, r0, 0x8, &(0x7f0000000180)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xf, 0x7, 0x700}, 0x10, 0x2263d, r1, 0x0, &(0x7f00000002c0)=[0x1, r2, r3, r4, r5, r6]}, 0x80) 00:12:26 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) (async) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) (async) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0x6b}, 0x2) (async) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000080)={0x0, 0x8}, 0x2) (async) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000000)) (async) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) [ 746.924266][ T6056] ------------[ cut here ]------------ [ 746.925385][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 746.927277][ T6056] Modules linked in: [ 746.928101][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 746.930351][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 746.932415][ T6056] Workqueue: usb_hub_wq hub_event [ 746.933535][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 746.935104][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 746.936119][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 746.937148][ T6056] sp : ffff800097356580 [ 746.937985][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 746.939602][ T6056] x26: 0000000000000001 x25: 1fffe0001b9d513d x24: dfff800000000000 [ 746.941246][ T6056] x23: ffff700012e6acb0 x22: ffff0000dcea8a00 x21: ffff8000973565a0 [ 746.942950][ T6056] x20: 0000000000000001 x19: ffff0000dcea89e8 x18: 1fffe00036842bc6 [ 746.944671][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 746.946316][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 746.948017][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 746.949680][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 746.951380][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 746.953122][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 746.954709][ T6056] Call trace: [ 746.955373][ T6056] __flush_work+0x1b4/0x1c0 [ 746.956281][ T6056] __cancel_work_timer+0x3e4/0x540 [ 746.957365][ T6056] cancel_work_sync+0x24/0x38 [ 746.958306][ T6056] smsusb_term_device+0x98/0x1cc [ 746.959295][ T6056] smsusb_probe+0xcb8/0x1a0c [ 746.960377][ T6056] usb_probe_interface+0x500/0x984 [ 746.961478][ T6056] really_probe+0x394/0xa7c [ 746.962477][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.963635][ T6056] driver_probe_device+0x78/0x330 [ 746.964705][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.965778][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.966822][ T6056] __device_attach+0x2b4/0x434 [ 746.967850][ T6056] device_initial_probe+0x24/0x34 [ 746.968974][ T6056] bus_probe_device+0x178/0x240 [ 746.969968][ T6056] device_add+0xa44/0xdf0 [ 746.970937][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 746.972074][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 746.973243][ T6056] usb_probe_device+0x120/0x25c [ 746.974285][ T6056] really_probe+0x394/0xa7c [ 746.975244][ T6056] __driver_probe_device+0x194/0x3b4 [ 746.976330][ T6056] driver_probe_device+0x78/0x330 [ 746.977375][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 746.978501][ T6056] bus_for_each_drv+0x228/0x2bc [ 746.979534][ T6056] __device_attach+0x2b4/0x434 [ 746.980543][ T6056] device_initial_probe+0x24/0x34 [ 746.981597][ T6056] bus_probe_device+0x178/0x240 [ 746.982624][ T6056] device_add+0xa44/0xdf0 [ 746.983486][ T6056] usb_new_device+0x904/0x142c [ 746.984484][ T6056] hub_event+0x25e4/0x474c [ 746.985486][ T6056] process_one_work+0x788/0x12d4 [ 746.986554][ T6056] worker_thread+0xb68/0xfe8 [ 746.987552][ T6056] kthread+0x288/0x310 [ 746.988402][ T6056] ret_from_fork+0x10/0x20 [ 746.989388][ T6056] irq event stamp: 2632196 [ 746.990392][ T6056] hardirqs last enabled at (2632195): [] __cancel_work_timer+0x3a4/0x540 [ 746.992538][ T6056] hardirqs last disabled at (2632196): [] el1_dbg+0x24/0x80 [ 746.994387][ T6056] softirqs last enabled at (2632188): [] __do_softirq+0xac0/0xd54 [ 746.996431][ T6056] softirqs last disabled at (2631673): [] ____do_softirq+0x14/0x20 [ 746.998450][ T6056] ---[ end trace 0000000000000000 ]--- [ 747.009796][ T6056] ------------[ cut here ]------------ [ 747.010948][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 747.012711][ T6056] Modules linked in: [ 747.013528][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 747.015688][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 747.017768][ T6056] Workqueue: usb_hub_wq hub_event [ 747.018838][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 747.020412][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 747.021439][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 747.022513][ T6056] sp : ffff800097356580 [ 747.023353][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 747.025072][ T6056] x26: 0000000000000001 x25: 1fffe0001b9d5161 x24: dfff800000000000 [ 747.026765][ T6056] x23: ffff700012e6acb0 x22: ffff0000dcea8b20 x21: ffff8000973565a0 [ 747.028416][ T6056] x20: 0000000000000001 x19: ffff0000dcea8b08 x18: 1fffe00036842bc6 [ 747.030075][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 747.031796][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 747.033458][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 747.035251][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 747.036896][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 747.038620][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 747.040244][ T6056] Call trace: [ 747.040935][ T6056] __flush_work+0x1b4/0x1c0 [ 747.041842][ T6056] __cancel_work_timer+0x3e4/0x540 [ 747.042903][ T6056] cancel_work_sync+0x24/0x38 [ 747.043892][ T6056] smsusb_term_device+0x98/0x1cc [ 747.044932][ T6056] smsusb_probe+0xcb8/0x1a0c [ 747.045890][ T6056] usb_probe_interface+0x500/0x984 [ 747.046950][ T6056] really_probe+0x394/0xa7c [ 747.047899][ T6056] __driver_probe_device+0x194/0x3b4 [ 747.048985][ T6056] driver_probe_device+0x78/0x330 [ 747.050026][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 747.051161][ T6056] bus_for_each_drv+0x228/0x2bc [ 747.052187][ T6056] __device_attach+0x2b4/0x434 [ 747.053195][ T6056] device_initial_probe+0x24/0x34 [ 747.054315][ T6056] bus_probe_device+0x178/0x240 [ 747.055368][ T6056] device_add+0xa44/0xdf0 [ 747.056299][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 747.057445][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 747.058642][ T6056] usb_probe_device+0x120/0x25c [ 747.059654][ T6056] really_probe+0x394/0xa7c [ 747.060598][ T6056] __driver_probe_device+0x194/0x3b4 [ 747.061716][ T6056] driver_probe_device+0x78/0x330 [ 747.062771][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 747.063985][ T6056] bus_for_each_drv+0x228/0x2bc [ 747.065070][ T6056] __device_attach+0x2b4/0x434 [ 747.066083][ T6056] device_initial_probe+0x24/0x34 [ 747.067148][ T6056] bus_probe_device+0x178/0x240 [ 747.068207][ T6056] device_add+0xa44/0xdf0 [ 747.069102][ T6056] usb_new_device+0x904/0x142c [ 747.070112][ T6056] hub_event+0x25e4/0x474c [ 747.071041][ T6056] process_one_work+0x788/0x12d4 [ 747.072110][ T6056] worker_thread+0xb68/0xfe8 [ 747.073044][ T6056] kthread+0x288/0x310 [ 747.073944][ T6056] ret_from_fork+0x10/0x20 [ 747.074857][ T6056] irq event stamp: 2632772 [ 747.075812][ T6056] hardirqs last enabled at (2632771): [] __cancel_work_timer+0x3a4/0x540 [ 747.077894][ T6056] hardirqs last disabled at (2632772): [] el1_dbg+0x24/0x80 [ 747.079803][ T6056] softirqs last enabled at (2632764): [] __do_softirq+0xac0/0xd54 [ 747.081786][ T6056] softirqs last disabled at (2632199): [] ____do_softirq+0x14/0x20 [ 747.083759][ T6056] ---[ end trace 0000000000000000 ]--- [ 747.092988][ T6056] smsusb:smsusb_probe: Device initialized with return code -19 [ 747.115515][ T6056] smsusb:smsusb_probe: board id=12, interface number 93 [ 747.157929][ T6056] smsusb:smsusb_probe: board id=12, interface number 212 [ 747.160521][ T6056] usb 1-1: USB disconnect, device number 89 [ 747.516815][ T6056] usb 1-1: new high-speed USB device number 90 using dummy_hcd [ 747.756714][ T6056] usb 1-1: Using ep0 maxpacket: 16 [ 747.886848][ T6056] usb 1-1: config 5 has an invalid interface number: 93 but max is 2 [ 747.888748][ T6056] usb 1-1: config 5 has an invalid interface number: 212 but max is 2 [ 747.890397][ T6056] usb 1-1: config 5 has no interface number 1 [ 747.891633][ T6056] usb 1-1: config 5 has no interface number 2 [ 747.892827][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0xC has invalid maxpacket 1023, setting to 64 [ 747.895004][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0x2, skipping [ 747.897175][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0x7 has invalid maxpacket 512, setting to 64 [ 747.899379][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0xB, skipping [ 747.901496][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0x1 has invalid maxpacket 1024, setting to 64 [ 747.903662][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0x2, skipping [ 747.905849][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has an invalid endpoint with address 0x80, skipping [ 747.908050][ T6056] usb 1-1: config 5 interface 93 altsetting 7 endpoint 0xA has invalid maxpacket 511, setting to 64 [ 747.910249][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0xB, skipping [ 747.912398][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0x1, skipping [ 747.914510][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has an invalid endpoint with address 0x0, skipping [ 747.916739][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0x9, skipping [ 747.918905][ T6056] usb 1-1: config 5 interface 0 has no altsetting 0 [ 747.920165][ T6056] usb 1-1: config 5 interface 93 has no altsetting 0 [ 747.921536][ T6056] usb 1-1: config 5 interface 212 has no altsetting 0 [ 748.077955][ T6056] usb 1-1: Dual-Role OTG device on HNP port [ 748.096741][ T6056] usb 1-1: New USB device found, idVendor=187f, idProduct=0302, bcdDevice= 8.17 [ 748.098743][ T6056] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 748.100437][ T6056] usb 1-1: Product: syz [ 748.101289][ T6056] usb 1-1: Manufacturer: syz [ 748.102319][ T6056] usb 1-1: SerialNumber: syz [ 748.105279][ T6056] usb 1-1: Interface #212 referenced by multiple IADs [ 748.419252][ T6056] smsusb:smsusb_probe: board id=12, interface number 0 [ 748.596907][ T6056] ------------[ cut here ]------------ [ 748.598107][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 748.599956][ T6056] Modules linked in: [ 748.600799][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 748.603120][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 748.605167][ T6056] Workqueue: usb_hub_wq hub_event [ 748.606210][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 748.607832][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 748.608808][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 748.609795][ T6056] sp : ffff800097356580 [ 748.610624][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 748.612239][ T6056] x26: 0000000000000001 x25: 1fffe0001b81d81d x24: dfff800000000000 [ 748.613850][ T6056] x23: ffff700012e6acb0 x22: ffff0000dc0ec100 x21: ffff8000973565a0 [ 748.615659][ T6056] x20: 0000000000000001 x19: ffff0000dc0ec0e8 x18: 1fffe00036842bc6 [ 748.617287][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff0001b4215e3c [ 748.619047][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 748.620637][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 748.622221][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 748.623847][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 748.625559][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 748.627196][ T6056] Call trace: [ 748.627834][ T6056] __flush_work+0x1b4/0x1c0 [ 748.628780][ T6056] __cancel_work_timer+0x3e4/0x540 [ 748.629841][ T6056] cancel_work_sync+0x24/0x38 [ 748.630817][ T6056] smsusb_term_device+0x98/0x1cc [ 748.631818][ T6056] smsusb_probe+0xcb8/0x1a0c [ 748.632711][ T6056] usb_probe_interface+0x500/0x984 [ 748.633745][ T6056] really_probe+0x394/0xa7c [ 748.634664][ T6056] __driver_probe_device+0x194/0x3b4 [ 748.635777][ T6056] driver_probe_device+0x78/0x330 [ 748.636770][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 748.637795][ T6056] bus_for_each_drv+0x228/0x2bc [ 748.638794][ T6056] __device_attach+0x2b4/0x434 [ 748.639755][ T6056] device_initial_probe+0x24/0x34 [ 748.640813][ T6056] bus_probe_device+0x178/0x240 [ 748.641809][ T6056] device_add+0xa44/0xdf0 [ 748.642716][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 748.643819][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 748.645000][ T6056] usb_probe_device+0x120/0x25c [ 748.646029][ T6056] really_probe+0x394/0xa7c [ 748.646948][ T6056] __driver_probe_device+0x194/0x3b4 [ 748.648048][ T6056] driver_probe_device+0x78/0x330 [ 748.649057][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 748.650119][ T6056] bus_for_each_drv+0x228/0x2bc [ 748.651085][ T6056] __device_attach+0x2b4/0x434 [ 748.652078][ T6056] device_initial_probe+0x24/0x34 [ 748.653095][ T6056] bus_probe_device+0x178/0x240 [ 748.654066][ T6056] device_add+0xa44/0xdf0 [ 748.654985][ T6056] usb_new_device+0x904/0x142c [ 748.655952][ T6056] hub_event+0x25e4/0x474c [ 748.656921][ T6056] process_one_work+0x788/0x12d4 [ 748.657912][ T6056] worker_thread+0xb68/0xfe8 [ 748.658886][ T6056] kthread+0x288/0x310 [ 748.659777][ T6056] ret_from_fork+0x10/0x20 [ 748.660700][ T6056] irq event stamp: 2645690 [ 748.661661][ T6056] hardirqs last enabled at (2645689): [] __cancel_work_timer+0x3a4/0x540 [ 748.663773][ T6056] hardirqs last disabled at (2645690): [] el1_dbg+0x24/0x80 [ 748.665596][ T6056] softirqs last enabled at (2643838): [] __do_softirq+0xac0/0xd54 [ 748.667478][ T6056] softirqs last disabled at (2643721): [] ____do_softirq+0x14/0x20 [ 748.669372][ T6056] ---[ end trace 0000000000000000 ]--- [ 748.670650][ T6056] ------------[ cut here ]------------ [ 748.671764][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 748.673660][ T6056] Modules linked in: [ 748.674513][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 748.676806][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 748.678854][ T6056] Workqueue: usb_hub_wq hub_event [ 748.679961][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 748.681601][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 748.682610][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 748.683610][ T6056] sp : ffff800097356580 [ 748.684432][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 748.686107][ T6056] x26: 0000000000000001 x25: 1fffe0001b81d841 x24: dfff800000000000 [ 748.687801][ T6056] x23: ffff700012e6acb0 x22: ffff0000dc0ec220 x21: ffff8000973565a0 [ 748.689489][ T6056] x20: 0000000000000001 x19: ffff0000dc0ec208 x18: 1fffe00036842bc6 [ 748.691177][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff0001b4215e3c [ 748.692789][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 748.694422][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 748.696006][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 748.697573][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 748.699243][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 748.700889][ T6056] Call trace: [ 748.701553][ T6056] __flush_work+0x1b4/0x1c0 [ 748.702465][ T6056] __cancel_work_timer+0x3e4/0x540 [ 748.703547][ T6056] cancel_work_sync+0x24/0x38 [ 748.704487][ T6056] smsusb_term_device+0x98/0x1cc [ 748.705610][ T6056] smsusb_probe+0xcb8/0x1a0c [ 748.706596][ T6056] usb_probe_interface+0x500/0x984 [ 748.707625][ T6056] really_probe+0x394/0xa7c [ 748.708557][ T6056] __driver_probe_device+0x194/0x3b4 [ 748.709628][ T6056] driver_probe_device+0x78/0x330 [ 748.710665][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 748.711747][ T6056] bus_for_each_drv+0x228/0x2bc [ 748.712775][ T6056] __device_attach+0x2b4/0x434 [ 748.713758][ T6056] device_initial_probe+0x24/0x34 [ 748.714795][ T6056] bus_probe_device+0x178/0x240 [ 748.715949][ T6056] device_add+0xa44/0xdf0 [ 748.716778][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 748.717999][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 748.719188][ T6056] usb_probe_device+0x120/0x25c [ 748.720228][ T6056] really_probe+0x394/0xa7c [ 748.721212][ T6056] __driver_probe_device+0x194/0x3b4 [ 748.722287][ T6056] driver_probe_device+0x78/0x330 [ 748.723327][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 748.724418][ T6056] bus_for_each_drv+0x228/0x2bc [ 748.725522][ T6056] __device_attach+0x2b4/0x434 [ 748.726552][ T6056] device_initial_probe+0x24/0x34 [ 748.727639][ T6056] bus_probe_device+0x178/0x240 [ 748.728698][ T6056] device_add+0xa44/0xdf0 [ 748.729593][ T6056] usb_new_device+0x904/0x142c [ 748.730634][ T6056] hub_event+0x25e4/0x474c [ 748.731569][ T6056] process_one_work+0x788/0x12d4 [ 748.732633][ T6056] worker_thread+0xb68/0xfe8 [ 748.733618][ T6056] kthread+0x288/0x310 [ 748.734462][ T6056] ret_from_fork+0x10/0x20 [ 748.735344][ T6056] irq event stamp: 2645768 [ 748.736290][ T6056] hardirqs last enabled at (2645767): [] __cancel_work_timer+0x3a4/0x540 [ 748.738394][ T6056] hardirqs last disabled at (2645768): [] el1_dbg+0x24/0x80 [ 748.740244][ T6056] softirqs last enabled at (2645760): [] __do_softirq+0xac0/0xd54 [ 748.742243][ T6056] softirqs last disabled at (2645693): [] ____do_softirq+0x14/0x20 [ 748.744189][ T6056] ---[ end trace 0000000000000000 ]--- [ 748.746356][ T6056] ------------[ cut here ]------------ [ 748.747537][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 748.749355][ T6056] Modules linked in: [ 748.750161][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 748.752415][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 748.754530][ T6056] Workqueue: usb_hub_wq hub_event [ 748.755602][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 748.757135][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 748.758173][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 748.759219][ T6056] sp : ffff800097356580 [ 748.760062][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 748.761751][ T6056] x26: 0000000000000001 x25: 1fffe0001b81d865 x24: dfff800000000000 [ 748.763490][ T6056] x23: ffff700012e6acb0 x22: ffff0000dc0ec340 x21: ffff8000973565a0 [ 748.765165][ T6056] x20: 0000000000000001 x19: ffff0000dc0ec328 x18: 1fffe00036842bc6 [ 748.766820][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff0001b4215e3c [ 748.768480][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 748.770187][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 748.771719][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 748.773473][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 748.775222][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 748.776933][ T6056] Call trace: [ 748.777685][ T6056] __flush_work+0x1b4/0x1c0 [ 748.778599][ T6056] __cancel_work_timer+0x3e4/0x540 [ 748.779714][ T6056] cancel_work_sync+0x24/0x38 [ 748.780638][ T6056] smsusb_term_device+0x98/0x1cc [ 748.781652][ T6056] smsusb_probe+0xcb8/0x1a0c [ 748.782603][ T6056] usb_probe_interface+0x500/0x984 [ 748.783719][ T6056] really_probe+0x394/0xa7c [ 748.784726][ T6056] __driver_probe_device+0x194/0x3b4 [ 748.785769][ T6056] driver_probe_device+0x78/0x330 [ 748.786744][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 748.787821][ T6056] bus_for_each_drv+0x228/0x2bc [ 748.788774][ T6056] __device_attach+0x2b4/0x434 [ 748.789863][ T6056] device_initial_probe+0x24/0x34 [ 748.790896][ T6056] bus_probe_device+0x178/0x240 [ 748.791941][ T6056] device_add+0xa44/0xdf0 [ 748.792837][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 748.793943][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 748.795097][ T6056] usb_probe_device+0x120/0x25c [ 748.796128][ T6056] really_probe+0x394/0xa7c [ 748.797042][ T6056] __driver_probe_device+0x194/0x3b4 [ 748.798141][ T6056] driver_probe_device+0x78/0x330 [ 748.799180][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 748.800245][ T6056] bus_for_each_drv+0x228/0x2bc [ 748.801248][ T6056] __device_attach+0x2b4/0x434 [ 748.802206][ T6056] device_initial_probe+0x24/0x34 [ 748.803262][ T6056] bus_probe_device+0x178/0x240 [ 748.804243][ T6056] device_add+0xa44/0xdf0 [ 748.805131][ T6056] usb_new_device+0x904/0x142c [ 748.806191][ T6056] hub_event+0x25e4/0x474c [ 748.807110][ T6056] process_one_work+0x788/0x12d4 [ 748.808136][ T6056] worker_thread+0xb68/0xfe8 [ 748.809118][ T6056] kthread+0x288/0x310 [ 748.810039][ T6056] ret_from_fork+0x10/0x20 [ 748.810970][ T6056] irq event stamp: 2646152 [ 748.811887][ T6056] hardirqs last enabled at (2646151): [] __cancel_work_timer+0x3a4/0x540 [ 748.813984][ T6056] hardirqs last disabled at (2646152): [] el1_dbg+0x24/0x80 [ 748.815824][ T6056] softirqs last enabled at (2646144): [] __do_softirq+0xac0/0xd54 [ 748.817795][ T6056] softirqs last disabled at (2645773): [] ____do_softirq+0x14/0x20 [ 748.819786][ T6056] ---[ end trace 0000000000000000 ]--- [ 748.821997][ T6056] ------------[ cut here ]------------ [ 748.823107][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 748.824848][ T6056] Modules linked in: [ 748.825653][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 748.827800][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 748.829800][ T6056] Workqueue: usb_hub_wq hub_event [ 748.830829][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 748.832489][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 748.833515][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 748.834482][ T6056] sp : ffff800097356580 [ 748.835408][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 748.837027][ T6056] x26: 0000000000000001 x25: 1fffe0001b81d889 x24: dfff800000000000 [ 748.838717][ T6056] x23: ffff700012e6acb0 x22: ffff0000dc0ec460 x21: ffff8000973565a0 [ 748.840457][ T6056] x20: 0000000000000001 x19: ffff0000dc0ec448 x18: 1fffe00036842bc6 [ 748.842016][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff0001b4215e3c [ 748.843797][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 748.845434][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 748.847108][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 748.848856][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 748.850483][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 748.852208][ T6056] Call trace: [ 748.852926][ T6056] __flush_work+0x1b4/0x1c0 [ 748.853876][ T6056] __cancel_work_timer+0x3e4/0x540 [ 748.854968][ T6056] cancel_work_sync+0x24/0x38 [ 748.855957][ T6056] smsusb_term_device+0x98/0x1cc [ 748.856923][ T6056] smsusb_probe+0xcb8/0x1a0c [ 748.857869][ T6056] usb_probe_interface+0x500/0x984 [ 748.858949][ T6056] really_probe+0x394/0xa7c [ 748.859782][ T6056] __driver_probe_device+0x194/0x3b4 [ 748.860883][ T6056] driver_probe_device+0x78/0x330 [ 748.861971][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 748.863062][ T6056] bus_for_each_drv+0x228/0x2bc [ 748.864065][ T6056] __device_attach+0x2b4/0x434 [ 748.865004][ T6056] device_initial_probe+0x24/0x34 [ 748.866068][ T6056] bus_probe_device+0x178/0x240 [ 748.867083][ T6056] device_add+0xa44/0xdf0 [ 748.867959][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 748.869150][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 748.870293][ T6056] usb_probe_device+0x120/0x25c [ 748.871268][ T6056] really_probe+0x394/0xa7c [ 748.872191][ T6056] __driver_probe_device+0x194/0x3b4 [ 748.873244][ T6056] driver_probe_device+0x78/0x330 [ 748.874270][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 748.875337][ T6056] bus_for_each_drv+0x228/0x2bc [ 748.876347][ T6056] __device_attach+0x2b4/0x434 [ 748.877353][ T6056] device_initial_probe+0x24/0x34 [ 748.878350][ T6056] bus_probe_device+0x178/0x240 [ 748.879376][ T6056] device_add+0xa44/0xdf0 [ 748.880351][ T6056] usb_new_device+0x904/0x142c [ 748.881413][ T6056] hub_event+0x25e4/0x474c [ 748.882356][ T6056] process_one_work+0x788/0x12d4 [ 748.883331][ T6056] worker_thread+0xb68/0xfe8 [ 748.884242][ T6056] kthread+0x288/0x310 [ 748.885116][ T6056] ret_from_fork+0x10/0x20 [ 748.886010][ T6056] irq event stamp: 2646560 [ 748.886957][ T6056] hardirqs last enabled at (2646559): [] __cancel_work_timer+0x3a4/0x540 [ 748.889035][ T6056] hardirqs last disabled at (2646560): [] el1_dbg+0x24/0x80 [ 748.890929][ T6056] softirqs last enabled at (2646552): [] __do_softirq+0xac0/0xd54 [ 748.892988][ T6056] softirqs last disabled at (2646155): [] ____do_softirq+0x14/0x20 [ 748.894893][ T6056] ---[ end trace 0000000000000000 ]--- [ 748.897044][ T6056] ------------[ cut here ]------------ [ 748.898200][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 748.900001][ T6056] Modules linked in: [ 748.900805][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 748.902962][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 748.904972][ T6056] Workqueue: usb_hub_wq hub_event [ 748.906019][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 748.907606][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 748.908601][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 748.909618][ T6056] sp : ffff800097356580 [ 748.910495][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 748.912180][ T6056] x26: 0000000000000001 x25: 1fffe0001b81d8ad x24: dfff800000000000 [ 748.913798][ T6056] x23: ffff700012e6acb0 x22: ffff0000dc0ec580 x21: ffff8000973565a0 [ 748.915417][ T6056] x20: 0000000000000001 x19: ffff0000dc0ec568 x18: 1fffe00036842bc6 [ 748.917104][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff0001b4215e3c [ 748.918687][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 748.920469][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 748.922056][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 748.923739][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 748.925379][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 748.927022][ T6056] Call trace: [ 748.927664][ T6056] __flush_work+0x1b4/0x1c0 [ 748.928624][ T6056] __cancel_work_timer+0x3e4/0x540 [ 748.929666][ T6056] cancel_work_sync+0x24/0x38 [ 748.930640][ T6056] smsusb_term_device+0x98/0x1cc [ 748.931657][ T6056] smsusb_probe+0xcb8/0x1a0c [ 748.932624][ T6056] usb_probe_interface+0x500/0x984 [ 748.933686][ T6056] really_probe+0x394/0xa7c [ 748.934607][ T6056] __driver_probe_device+0x194/0x3b4 [ 748.935677][ T6056] driver_probe_device+0x78/0x330 [ 748.936723][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 748.937817][ T6056] bus_for_each_drv+0x228/0x2bc [ 748.938872][ T6056] __device_attach+0x2b4/0x434 [ 748.939869][ T6056] device_initial_probe+0x24/0x34 [ 748.940889][ T6056] bus_probe_device+0x178/0x240 [ 748.942020][ T6056] device_add+0xa44/0xdf0 [ 748.942977][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 748.944158][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 748.945283][ T6056] usb_probe_device+0x120/0x25c [ 748.946299][ T6056] really_probe+0x394/0xa7c [ 748.947233][ T6056] __driver_probe_device+0x194/0x3b4 [ 748.948324][ T6056] driver_probe_device+0x78/0x330 [ 748.949402][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 748.950450][ T6056] bus_for_each_drv+0x228/0x2bc [ 748.951460][ T6056] __device_attach+0x2b4/0x434 [ 748.952382][ T6056] device_initial_probe+0x24/0x34 [ 748.953411][ T6056] bus_probe_device+0x178/0x240 [ 748.954394][ T6056] device_add+0xa44/0xdf0 [ 748.955296][ T6056] usb_new_device+0x904/0x142c [ 748.956327][ T6056] hub_event+0x25e4/0x474c [ 748.957238][ T6056] process_one_work+0x788/0x12d4 [ 748.958332][ T6056] worker_thread+0xb68/0xfe8 [ 748.959297][ T6056] kthread+0x288/0x310 [ 748.960157][ T6056] ret_from_fork+0x10/0x20 [ 748.961121][ T6056] irq event stamp: 2646980 [ 748.962004][ T6056] hardirqs last enabled at (2646979): [] __cancel_work_timer+0x3a4/0x540 [ 748.964018][ T6056] hardirqs last disabled at (2646980): [] el1_dbg+0x24/0x80 [ 748.965860][ T6056] softirqs last enabled at (2646972): [] __do_softirq+0xac0/0xd54 [ 748.967731][ T6056] softirqs last disabled at (2646563): [] ____do_softirq+0x14/0x20 [ 748.969714][ T6056] ---[ end trace 0000000000000000 ]--- [ 748.970924][ T6056] ------------[ cut here ]------------ [ 748.972026][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 748.973867][ T6056] Modules linked in: [ 748.974694][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 748.976898][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 748.978950][ T6056] Workqueue: usb_hub_wq hub_event [ 748.979953][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 748.981520][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 748.982532][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 748.983559][ T6056] sp : ffff800097356580 [ 748.984400][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 748.986113][ T6056] x26: 0000000000000001 x25: 1fffe0001b81d8d1 x24: dfff800000000000 [ 748.987770][ T6056] x23: ffff700012e6acb0 x22: ffff0000dc0ec6a0 x21: ffff8000973565a0 [ 748.989442][ T6056] x20: 0000000000000001 x19: ffff0000dc0ec688 x18: 1fffe00036842bc6 [ 748.991072][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff0001b4215e3c [ 748.992663][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 748.994377][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 748.996011][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 748.997693][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 748.999415][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 749.000970][ T6056] Call trace: [ 749.001668][ T6056] __flush_work+0x1b4/0x1c0 [ 749.002566][ T6056] __cancel_work_timer+0x3e4/0x540 [ 749.003640][ T6056] cancel_work_sync+0x24/0x38 [ 749.004575][ T6056] smsusb_term_device+0x98/0x1cc [ 749.005598][ T6056] smsusb_probe+0xcb8/0x1a0c [ 749.006550][ T6056] usb_probe_interface+0x500/0x984 [ 749.007565][ T6056] really_probe+0x394/0xa7c [ 749.008497][ T6056] __driver_probe_device+0x194/0x3b4 [ 749.009604][ T6056] driver_probe_device+0x78/0x330 [ 749.010651][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 749.011827][ T6056] bus_for_each_drv+0x228/0x2bc [ 749.012761][ T6056] __device_attach+0x2b4/0x434 [ 749.013706][ T6056] device_initial_probe+0x24/0x34 [ 749.014770][ T6056] bus_probe_device+0x178/0x240 [ 749.015833][ T6056] device_add+0xa44/0xdf0 [ 749.016708][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 749.017864][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 749.019029][ T6056] usb_probe_device+0x120/0x25c [ 749.020024][ T6056] really_probe+0x394/0xa7c [ 749.020917][ T6056] __driver_probe_device+0x194/0x3b4 [ 749.021985][ T6056] driver_probe_device+0x78/0x330 [ 749.023061][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 749.024148][ T6056] bus_for_each_drv+0x228/0x2bc [ 749.025152][ T6056] __device_attach+0x2b4/0x434 [ 749.026138][ T6056] device_initial_probe+0x24/0x34 [ 749.027169][ T6056] bus_probe_device+0x178/0x240 [ 749.028149][ T6056] device_add+0xa44/0xdf0 [ 749.029047][ T6056] usb_new_device+0x904/0x142c [ 749.029998][ T6056] hub_event+0x25e4/0x474c [ 749.030905][ T6056] process_one_work+0x788/0x12d4 [ 749.031909][ T6056] worker_thread+0xb68/0xfe8 [ 749.032894][ T6056] kthread+0x288/0x310 [ 749.033775][ T6056] ret_from_fork+0x10/0x20 [ 749.034655][ T6056] irq event stamp: 2647028 [ 749.035582][ T6056] hardirqs last enabled at (2647027): [] __cancel_work_timer+0x3a4/0x540 [ 749.037648][ T6056] hardirqs last disabled at (2647028): [] el1_dbg+0x24/0x80 [ 749.039482][ T6056] softirqs last enabled at (2647024): [] __do_softirq+0xac0/0xd54 [ 749.041407][ T6056] softirqs last disabled at (2646983): [] ____do_softirq+0x14/0x20 [ 749.043380][ T6056] ---[ end trace 0000000000000000 ]--- [ 749.045432][ T6056] ------------[ cut here ]------------ [ 749.046567][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 749.048423][ T6056] Modules linked in: [ 749.049271][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 749.051671][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 749.053676][ T6056] Workqueue: usb_hub_wq hub_event [ 749.054694][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 749.056257][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 749.057347][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 749.058380][ T6056] sp : ffff800097356580 [ 749.059222][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 749.060837][ T6056] x26: 0000000000000001 x25: 1fffe0001b81d8f5 x24: dfff800000000000 [ 749.062416][ T6056] x23: ffff700012e6acb0 x22: ffff0000dc0ec7c0 x21: ffff8000973565a0 [ 749.064147][ T6056] x20: 0000000000000001 x19: ffff0000dc0ec7a8 x18: 1fffe00036842bc6 [ 749.065787][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff0001b4215e3c [ 749.067529][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 749.069199][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 749.070831][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 749.072468][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 749.074194][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 749.075817][ T6056] Call trace: [ 749.076534][ T6056] __flush_work+0x1b4/0x1c0 [ 749.077590][ T6056] __cancel_work_timer+0x3e4/0x540 [ 749.078636][ T6056] cancel_work_sync+0x24/0x38 [ 749.079674][ T6056] smsusb_term_device+0x98/0x1cc [ 749.080736][ T6056] smsusb_probe+0xcb8/0x1a0c [ 749.081665][ T6056] usb_probe_interface+0x500/0x984 [ 749.082726][ T6056] really_probe+0x394/0xa7c [ 749.083594][ T6056] __driver_probe_device+0x194/0x3b4 [ 749.084722][ T6056] driver_probe_device+0x78/0x330 00:12:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xe, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) r1 = syz_usb_connect(0x3, 0xc09, &(0x7f0000000b40)={{0x12, 0x1, 0x110, 0x6d, 0x9b, 0xc0, 0x10, 0x187f, 0x302, 0x817, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xbf7, 0x3, 0x5, 0xe1, 0x90, 0x5, [{{0x9, 0x4, 0x0, 0x5, 0xd, 0xb6, 0x6b, 0x54, 0x13, [@generic={0xe2, 0x23, "7a135dc100e8e7cc0545b933efe6186650fa4d6ff8ff9fc6d10c134a23bfbb74887d4aa605f5c5d4830b8e73d1077874aa7f91199d1556a5ed06dcde8c52af76321c341be3d7f1191b9ae487d9bedc3c24ee98fff2cbcfdc58240ece44e8b1460632e4385af1ec2e0fde5bae7172a44c018cf0ea7e1b37814f0b6fd97021b0c20f4e0cd845f7a1a64a146e7c35e6bf2ea0b26297cedeabe910d0fce966ac5ad60179ef7591dc8a65ab0f543e997d4eab639c302a73287b25af116698ffe04f1badac7fbf39321b595db550da19b44380cc29ccabe8229201c7341b8fee337e4d"}], [{{0x9, 0x5, 0x3, 0x0, 0x20, 0xff, 0x92, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xad, 0x1}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x0, 0x9}]}}, {{0x9, 0x5, 0x6, 0x1, 0x200, 0x9, 0x0, 0x9, [@generic={0x8b, 0xa, "9d57533c1ba63b12a5ff9df5b4b9750ed4eef8ce0d29cb07bdafc6a6fedb6d77d5e1e88fa00238f71708e72c3ae09b23573789cb02e3586b68def0ca1cb058469af9216d4af47f8d1e751312387dd73ac2b604640f37c7a97ab70efdcebd398796a8da1f73a489b754e83716d744d13150c8a14c0f7ec50644ac0c4705d6d3df4b66262168cd15cee4"}]}}, {{0x9, 0x5, 0xc, 0x0, 0x3ff, 0x0, 0x3, 0xc, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x5, 0x3}]}}, {{0x9, 0x5, 0x2, 0x4, 0x28, 0x0, 0x40, 0x40, [@generic={0x2d, 0x31, "4b019e17c14610a75bba08075ba34f680fa01804b12180ea718c3d6ca26ca189829eff3cbb86c68858f8ae"}, @generic={0xb3, 0xb, "8c7b81e6fbeba6e961044b82ca11b41e3ed227e77801e489384134008c874cb5e1e3374b3cce73b8feaa6fe2188c1140e3ee90a1e608079eb6ab1569ace1d4a8fb2cde9b9535081b7e6c753079a2d2046e98274f410ac0e9520f1fcdd2df89a3adee4fea425b814de64f097f7765b2481b9ae6a5ad330f60039736d04df527a5b36143d7c1b8c747d8078a2435e2abaaa47f2cfa88bace765beec113e192b7014f8e0c24ba9e9f647a5c399d92757b1e72"}]}}, {{0x9, 0x5, 0xb, 0x10, 0x8, 0x4, 0x0, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x9}]}}, {{0x9, 0x5, 0x2, 0x10, 0x20, 0x20, 0x0, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x5, 0x3}]}}, {{0x9, 0x5, 0x7, 0x4, 0x200, 0x4, 0x8, 0x9, [@generic={0xe0, 0x10, "07f49d639f75d400d6abe0771d265ca87ba6d6995670761d98bb81a56c47828afe3e4f344aa778938ceb36678b36b0cf53bf5e4696853b7def97dacf969eec79c580987120676338746f3a5fe04b04042573709aca6e6993e7bb7c9042781e19c282e9515d4a505c1b86dab3c7578d9eff062562eb7020c5c0cd47720881fce52bf447db4ec6d4485c4b03deb6350d2f65c95fea9fbc12a8934aa434596dcaae56712fb690a17d68e71d2ac377fab9f7717ea5dbbc0a0dbf48c859b30f658323c572f507e020973f10c070b4aa0ba9cb1e0dce42e014c5e5cdcac2004cc7"}]}}, {{0x9, 0x5, 0xb, 0x8, 0x10, 0x3f, 0x7, 0x81, [@generic={0xdd, 0x24, "9bfde775d18e5240467003251666c37b63ecf76d83b51941878dcae90135f728bd954117607e9d0703707efca1c8d16536ac4b8b02ccce1f36f4128365b037f7a98365f8f37c9907bde723b02d5db3113a58296f01ef1f85a30bc11facff51510c2f007784115330ad0ae44a22885aa93892680b3aae2aa5a886a7e1314bed5610a447f26eab10d7c7ea6e344501c5daec8882d6354bf482d32bac5cb2e3c60d36ab58845a819ad5c9693b197553d69e293f4b6ff3c4d5de3ea409b2bb46008aca955aa97239a502f74684e1a196ef75132780bbaeec91f60ff9b0"}]}}, {{0x9, 0x5, 0x5, 0x0, 0x10, 0x20, 0x80, 0x3, [@generic={0xd9, 0xb, "aca4fa4252d9ed94294cf72d77e1acb265500fc4cfda6409078e8d237d15fba5e6301f3ac2835dc96ba8147ce6f2333e065bb99f211b00d266aa790b2c82fe9be07397447db4411aa1d7b0b7b436cc4a6d911787a8c8217f8844ff4db722fa17b0b02d2a45add096a2ca67699b53d6eba77da61d104092f89df48c6f4960d78ef3e00afc9726e49231de367635f0aa33ed95dfc5e10685e06d65d7e7f9c69a37fb54ebbb4aa48653621e2fb082255461d7a514eb6b16fd2b17418755dbf73c27fb7390a88a799f89a69632a7b1c26c62763ab6206a4080"}]}}, {{0x9, 0x5, 0x1, 0x10, 0x400, 0x6, 0x1f, 0x1, [@generic={0xa7, 0x21, "14811a29c5ae1d9910c328e6c77cb2b6d3d558f684f1a8b7b1ba8b1a33a0a48fcf1bf2e9d7b39385e84fd58f4a18b3123759428be33d86fbf505088d455d16326a64df0419df3c331b93f7b85a30ed125322b01eaa450db7698a44cc0a05cf33198561962968485406e815fb0868f08c6a16b37a9d5e03a81eb0df5fee57246db3689f927b9380e894069cad4796691cf02e381ac60e3b3f6b0cc865461b8644619b276ce8"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x5, 0x1000}]}}, {{0x9, 0x5, 0x9, 0x4, 0x40, 0x8, 0x22, 0x1f, [@generic={0xa6, 0xc, "f39e187d06bd2c24cb7a17470178ae886bd270ca5246b031140c7dc39b59a1b8c49fb3f9312b9df72a79096f9a017d89d5f0c7eeee68090487fec50521bb698e1c59814f87036124f3301d2ae6297071b1e25feada1341973b66865a11648613bcdebe40c78646de0604f93ca6e8f621fad79012739775e530b1f3174accf9cb00c70957ea07f9bb6431603351c76190670d498fb95818d6c37a040ff67db0e82baf2083"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x408, 0x8, 0x5, 0x8, [@generic={0x66, 0x31, "c48884bd4e099a7a00cdf4c68eda2f87bf1edd37f52cd990b7e59fc26bd60ab5c59455c46016f13b47502646c4ad549dd20613e6830d2b505a85add960a74e06096b1e3e01fad59a60e0e2ca0a23dd19008a9e4616080e28a420b1215659801217c3627e"}]}}, {{0x9, 0x5, 0x80, 0x8, 0x3ff, 0x0, 0x42, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x8, 0x5}, @generic={0xc0, 0x23, "bb6a114ac086aeab845a9dcbf82da6ce1da151c285b8b20f9cc185d697d205c321e2537a3ec0dc14a1a8ed660d92b8222ed6f2730feca67f8327eb6d799a3e8d6a9dca9e74b20eb60bcd7f6d7cce6dc09405d83c5b7cc35eeb5dc8b5cb0f4f1b0cbc5cacfb5c00a9ecb6f032a4cbea22f2dd9148c49dc831a26d2d6889d2253ba72f2d6dab1b3f06723e92da2126200190f1a3f0d1c400d3c1d0297c3757ce9488e1ec1a3df18958a1bac48938932215c3dda45526da9990e22cac6400c4"}]}}]}}, {{0x9, 0x4, 0x5d, 0x7, 0x2, 0xff, 0x4, 0x6a, 0x0, [@cdc_ncm={{0x9, 0x24, 0x6, 0x0, 0x1, "1c3ecb34"}, {0x5, 0x24, 0x0, 0xc3}, {0xd, 0x24, 0xf, 0x1, 0x3, 0x7fff, 0x80, 0x6}, {0x6, 0x24, 0x1a, 0xfff, 0x9}, [@mdlm={0x15, 0x24, 0x12, 0x1}, @mdlm={0x15, 0x24, 0x12, 0x4}]}, @hid_hid={0x9, 0x21, 0x3ff, 0xa8, 0x1, {0x22, 0x8e1}}], [{{0x9, 0x5, 0xa, 0x0, 0x1ff, 0x8, 0x9, 0x2, [@generic={0xb8, 0x8, "9f46b267cb58a7c1fa16ff61167d9d2369f58b1558c2c37a6a37b3c268d2da094168472bea1583a16a91e4d25e25418bff3e2e0b798e27602f5acf670328aea1daa77846d357aa9133fc204a05909eb4e0d192d75733d8562783ce1beaf39104e319af5f57deebc72765ceb88693fbd642b77258c958e8b9a47f3a729d8714d6e955b5dd9588f73aa391ed95de7ec10df48b6f19a838c38d3fa101692300f9000658e4783e6b70dd8bc6efd13c9763ae2300f717ddd2"}, @generic={0x3b, 0x9, "77c55219d510f22748060924fc9aa3c551fc47663a5e7ed83c2529fe1c65e2c2b09a22e2fded72ccafcb0f2b1f06bc6208fc1136c2aa175eea"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x8, 0x0, 0x2, 0x7f, [@generic={0x73, 0x31, "1bc282f8d117622ad1a0b701b02987fcefd6f13fc54d192d0fc7ae1201f01a04d0713dfbefe000b24ce416470e95ddfdc78ffc0801eafc576bd731301f605d434b3c57c2ec4ab03cd23cc30e230bfaf26ef10ec785dac881e2e102c40c5451f98a0960b6c068825ef779ca08eac2dbcb9f"}]}}]}}, {{0x9, 0x4, 0xd4, 0x1, 0x4, 0xe0, 0xa0, 0xb3, 0x9, [@hid_hid={0x9, 0x21, 0x0, 0x6, 0x1, {0x22, 0xcd2}}], [{{0x9, 0x5, 0xb, 0x0, 0x10, 0x3f, 0x7f, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x49, 0x5}]}}, {{0x9, 0x5, 0x1, 0x6, 0x8, 0x56, 0x2, 0x40, [@generic={0xba, 0x7, "e87340d296e8079cf3e731e2664ef4ad6999e19ab5656098ad33c34293721a854af5158b07f18bc5c1f6f0e40415efa10c7f33d2977f69e03d8d1141f258cf46f8f6c993910f86d7f11008453ff6711600485c0fa031afbe3630d9f21a765ca562b9f4e6563f3b522bfe86888d42aeb5d7c4e8d1c64310acccf6856676e635cce92ea242c0a6b0697108f2681a1caa33a364b23005ac20f32ae04af7e57092456512bb744aaddcbc6cfb93b924d095eead0bbe058969d640"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x3, 0x8001}]}}, {{0x9, 0x5, 0x0, 0x4, 0x3ff, 0x6, 0x1, 0xff, [@generic={0x31, 0x24, "f421d3d35748dccbcfda43aa3a8f0860a1aa51a2dc3ccbcdc9e800eb0624b0be188f1b3037ec8b4a8e512febdde11c"}]}}, {{0x9, 0x5, 0x9, 0x10, 0x44c, 0x81, 0x8, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xfc, 0x1}, @generic={0xde, 0x2f, "092caeb0108a3184a6168a36eaf452d75bdff776807bb7a70ae41e824272f29580b817874618e4392fac659c2d5c18f8255a00aa5528bccf9d27ff0524877f19807a1e9eb4173f86fc759098ce0a4bb7420e5f9b8338c5b56ac348553df30aefbf639c7e5257e635cc4a0a283ce3b42557e5365de92e82132b5b9e4ab3f5ac9e2235262535d8e8ba7b6d6301bca94b6c4f8ceba8369962bfc1be95053d2c9aba7367386a9c92e826d6a54cf3edff9abb0acbabc2db6548003cac4bf644304590d3f74cf38b51db4c38fdd0a5c42acc57dbb14bbb97f3cee13ce9db90"}]}}]}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x110, 0xb7, 0x8, 0xe0, 0x10, 0x9}, 0x5d, &(0x7f0000000340)={0x5, 0xf, 0x5d, 0x6, [@wireless={0xb, 0x10, 0x1, 0x2, 0x4, 0x1f, 0x1, 0x1, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "bb06cedd1b4e28ff4c1a21b2ce1e8892"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x9, 0x9, 0x1, 0x80}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0xa, 0xb, 0x1f}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "f6cac795c53a73ed6a93ea94bf96be2a"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "18b321f66d2fdfc4b1955ba406f93a82"}]}, 0x1, [{0xbd, &(0x7f00000003c0)=@string={0xbd, 0x3, "f342dee56c73e334ac155b8d1a9816b9ab6651172fa0470aea9399febc1eee2aae09949862c2a825e6246b98fa0e4512584891cce4e0f767848a82d2470be4fbd1ebc1cb5dc09d98580a582584baa75c156f72345ae5d5eabbef957bed4c7e6177b705e4faf688ac8b0acceff768cd2cdcf23e024d75043a297465687d82cbd67f4d3bf57d8b79c1d50a56fff74fdc1237579701b4d1f679129e55d7573be3d7c6b7123612e7732dd51b314b2eb612f7a53df55139610f93028f47"}}]}) syz_usb_disconnect(r1) getsockopt$MRT(r0, 0x0, 0xcf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r2) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x9, 0x20, 0x10, "210272cb635dcaffeeb6679d02e9ea99b5b0df2a89fffffffffffffffb0dee3e68f686391e2d5eebf58a18fcae1ea91ad44cc7af5ae033955c1ad11784240fb1", "a54164365100000800435981500000b91bfe62dcf1a701c7986bf133d4db87539b86094d2f2faa5800", "899402ba9dc4c7b342af83749819d201d80fb05e6117d7c7dfed0a6f3068cffb", [0xfffffffffffffffa, 0xa6e]}) syz_open_dev$loop(&(0x7f0000000100), 0x88d9, 0x40000) 00:12:29 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0xe, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:29 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x0, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:29 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) (async) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) (async) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0x6b}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000080)={0x0, 0x8}, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r1) (async) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000000)) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) 00:12:29 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x87c0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000900), r0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10008043) setsockopt$MRT_INIT(0xffffffffffffffff, 0x0, 0xc8, &(0x7f00000000c0), 0x4) syz_usb_ep_read(0xffffffffffffffff, 0x1, 0xac, &(0x7f0000000000)=""/172) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x7d, &(0x7f0000000140)="6e8d5c7fdfb02dede216b3a269bcac1ccddc033e741654e747cd768f8684f2dd2ad5ab2c2b425935b207abc7306294d83d9b7d4f35d4cc3a5b5ca7af2abe82d7ba219354990a122f75c21bd587e4b382356998341cb4bc365bcc9867a9a34a22a202f601b36b6d2d8409e611e8d09ac4e60c709f14735e3ca7d50a8bd8") 00:12:29 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x12, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) [ 749.085809][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 749.086931][ T6056] bus_for_each_drv+0x228/0x2bc [ 749.087943][ T6056] __device_attach+0x2b4/0x434 [ 749.088933][ T6056] device_initial_probe+0x24/0x34 [ 749.090000][ T6056] bus_probe_device+0x178/0x240 [ 749.091012][ T6056] device_add+0xa44/0xdf0 [ 749.091992][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 749.093160][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 749.094379][ T6056] usb_probe_device+0x120/0x25c [ 749.095488][ T6056] really_probe+0x394/0xa7c [ 749.096410][ T6056] __driver_probe_device+0x194/0x3b4 [ 749.097610][ T6056] driver_probe_device+0x78/0x330 [ 749.098701][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 749.099887][ T6056] bus_for_each_drv+0x228/0x2bc [ 749.100915][ T6056] __device_attach+0x2b4/0x434 [ 749.101947][ T6056] device_initial_probe+0x24/0x34 [ 749.102993][ T6056] bus_probe_device+0x178/0x240 [ 749.104058][ T6056] device_add+0xa44/0xdf0 [ 749.104967][ T6056] usb_new_device+0x904/0x142c [ 749.105995][ T6056] hub_event+0x25e4/0x474c [ 749.106990][ T6056] process_one_work+0x788/0x12d4 [ 749.108037][ T6056] worker_thread+0xb68/0xfe8 [ 749.109078][ T6056] kthread+0x288/0x310 [ 749.109915][ T6056] ret_from_fork+0x10/0x20 [ 749.110845][ T6056] irq event stamp: 2647596 [ 749.111834][ T6056] hardirqs last enabled at (2647595): [] __cancel_work_timer+0x3a4/0x540 [ 749.114047][ T6056] hardirqs last disabled at (2647596): [] el1_dbg+0x24/0x80 [ 749.115907][ T6056] softirqs last enabled at (2647592): [] __do_softirq+0xac0/0xd54 [ 749.117864][ T6056] softirqs last disabled at (2647031): [] ____do_softirq+0x14/0x20 [ 749.119851][ T6056] ---[ end trace 0000000000000000 ]--- [ 749.133497][ T6056] ------------[ cut here ]------------ [ 749.134621][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 749.136583][ T6056] Modules linked in: [ 749.137430][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 749.139759][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 749.141819][ T6056] Workqueue: usb_hub_wq hub_event [ 749.142895][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 749.144493][ T6056] pc : __flush_work+0x1b4/0x1c0 00:12:29 executing program 2: socketpair(0x25, 0x2, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000040)={@any, 0x8}) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 749.145460][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 749.146498][ T6056] sp : ffff800097356580 [ 749.147427][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 749.149202][ T6056] x26: 0000000000000001 x25: 1fffe0001b81d919 x24: dfff800000000000 [ 749.150943][ T6056] x23: ffff700012e6acb0 x22: ffff0000dc0ec8e0 x21: ffff8000973565a0 [ 749.152670][ T6056] x20: 0000000000000001 x19: ffff0000dc0ec8c8 x18: 1fffe00036842bc6 [ 749.154493][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff0001b4215e3c [ 749.156192][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 749.157917][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 749.159667][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 749.161401][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 749.163045][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 749.164770][ T6056] Call trace: [ 749.165479][ T6056] __flush_work+0x1b4/0x1c0 [ 749.166421][ T6056] __cancel_work_timer+0x3e4/0x540 [ 749.167500][ T6056] cancel_work_sync+0x24/0x38 [ 749.168499][ T6056] smsusb_term_device+0x98/0x1cc [ 749.169549][ T6056] smsusb_probe+0xcb8/0x1a0c [ 749.170554][ T6056] usb_probe_interface+0x500/0x984 [ 749.171707][ T6056] really_probe+0x394/0xa7c [ 749.172667][ T6056] __driver_probe_device+0x194/0x3b4 [ 749.173757][ T6056] driver_probe_device+0x78/0x330 [ 749.174768][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 749.175928][ T6056] bus_for_each_drv+0x228/0x2bc [ 749.176950][ T6056] __device_attach+0x2b4/0x434 [ 749.177991][ T6056] device_initial_probe+0x24/0x34 [ 749.179110][ T6056] bus_probe_device+0x178/0x240 [ 749.180171][ T6056] device_add+0xa44/0xdf0 [ 749.181070][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 749.182251][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 749.183433][ T6056] usb_probe_device+0x120/0x25c [ 749.184470][ T6056] really_probe+0x394/0xa7c [ 749.185445][ T6056] __driver_probe_device+0x194/0x3b4 [ 749.186574][ T6056] driver_probe_device+0x78/0x330 [ 749.187657][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 749.188851][ T6056] bus_for_each_drv+0x228/0x2bc [ 749.189871][ T6056] __device_attach+0x2b4/0x434 [ 749.190923][ T6056] device_initial_probe+0x24/0x34 [ 749.191985][ T6056] bus_probe_device+0x178/0x240 [ 749.193122][ T6056] device_add+0xa44/0xdf0 [ 749.194066][ T6056] usb_new_device+0x904/0x142c [ 749.195138][ T6056] hub_event+0x25e4/0x474c [ 749.196016][ T6056] process_one_work+0x788/0x12d4 [ 749.197112][ T6056] worker_thread+0xb68/0xfe8 [ 749.198083][ T6056] kthread+0x288/0x310 [ 749.198944][ T6056] ret_from_fork+0x10/0x20 [ 749.199984][ T6056] irq event stamp: 2647988 [ 749.200938][ T6056] hardirqs last enabled at (2647987): [] __cancel_work_timer+0x3a4/0x540 [ 749.203122][ T6056] hardirqs last disabled at (2647988): [] el1_dbg+0x24/0x80 [ 749.205038][ T6056] softirqs last enabled at (2647980): [] __do_softirq+0xac0/0xd54 [ 749.206948][ T6056] softirqs last disabled at (2647599): [] ____do_softirq+0x14/0x20 [ 749.208989][ T6056] ---[ end trace 0000000000000000 ]--- 00:12:29 executing program 2: socketpair(0x25, 0x2, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000040)={@any, 0x8}) (async, rerun: 64) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) (async, rerun: 64) socket$nl_generic(0x10, 0x3, 0x10) [ 749.245830][ T6056] ------------[ cut here ]------------ [ 749.247007][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 749.248960][ T6056] Modules linked in: [ 749.249786][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 749.252056][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 749.254127][ T6056] Workqueue: usb_hub_wq hub_event [ 749.255217][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 749.256733][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 749.257673][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 749.258732][ T6056] sp : ffff800097356580 [ 749.259579][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 749.261186][ T6056] x26: 0000000000000001 x25: 1fffe0001b81d93d x24: dfff800000000000 [ 749.262825][ T6056] x23: ffff700012e6acb0 x22: ffff0000dc0eca00 x21: ffff8000973565a0 [ 749.264495][ T6056] x20: 0000000000000001 x19: ffff0000dc0ec9e8 x18: 1fffe00036842bc6 [ 749.266158][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff0001b4215e3c [ 749.267924][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 749.269582][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 749.271279][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 749.272993][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 749.274602][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 749.276260][ T6056] Call trace: [ 749.276910][ T6056] __flush_work+0x1b4/0x1c0 [ 749.277863][ T6056] __cancel_work_timer+0x3e4/0x540 [ 749.278912][ T6056] cancel_work_sync+0x24/0x38 [ 749.279900][ T6056] smsusb_term_device+0x98/0x1cc [ 749.280922][ T6056] smsusb_probe+0xcb8/0x1a0c [ 749.282030][ T6056] usb_probe_interface+0x500/0x984 [ 749.283130][ T6056] really_probe+0x394/0xa7c [ 749.284046][ T6056] __driver_probe_device+0x194/0x3b4 [ 749.285128][ T6056] driver_probe_device+0x78/0x330 [ 749.286146][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 749.287241][ T6056] bus_for_each_drv+0x228/0x2bc [ 749.288206][ T6056] __device_attach+0x2b4/0x434 [ 749.289219][ T6056] device_initial_probe+0x24/0x34 [ 749.290268][ T6056] bus_probe_device+0x178/0x240 [ 749.291290][ T6056] device_add+0xa44/0xdf0 [ 749.292173][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 749.293341][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 749.294516][ T6056] usb_probe_device+0x120/0x25c [ 749.295513][ T6056] really_probe+0x394/0xa7c [ 749.296442][ T6056] __driver_probe_device+0x194/0x3b4 [ 749.297587][ T6056] driver_probe_device+0x78/0x330 [ 749.298687][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 749.299830][ T6056] bus_for_each_drv+0x228/0x2bc [ 749.300879][ T6056] __device_attach+0x2b4/0x434 [ 749.301927][ T6056] device_initial_probe+0x24/0x34 [ 749.302924][ T6056] bus_probe_device+0x178/0x240 [ 749.303913][ T6056] device_add+0xa44/0xdf0 [ 749.304798][ T6056] usb_new_device+0x904/0x142c [ 749.305758][ T6056] hub_event+0x25e4/0x474c [ 749.306641][ T6056] process_one_work+0x788/0x12d4 [ 749.307701][ T6056] worker_thread+0xb68/0xfe8 [ 749.308710][ T6056] kthread+0x288/0x310 [ 749.309629][ T6056] ret_from_fork+0x10/0x20 [ 749.310554][ T6056] irq event stamp: 2648432 [ 749.311474][ T6056] hardirqs last enabled at (2648431): [] __cancel_work_timer+0x3a4/0x540 [ 749.313642][ T6056] hardirqs last disabled at (2648432): [] el1_dbg+0x24/0x80 [ 749.315429][ T6056] softirqs last enabled at (2648424): [] __do_softirq+0xac0/0xd54 [ 749.317440][ T6056] softirqs last disabled at (2647993): [] ____do_softirq+0x14/0x20 [ 749.319391][ T6056] ---[ end trace 0000000000000000 ]--- 00:12:29 executing program 3: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0xe, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) 00:12:29 executing program 2: socketpair(0x25, 0x2, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000040)={@any, 0x8}) (async) bpf$MAP_DELETE_BATCH(0x12, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) 00:12:29 executing program 3: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0xe, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) [ 749.394415][ T6056] ------------[ cut here ]------------ [ 749.395607][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 749.397424][ T6056] Modules linked in: [ 749.398227][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 749.400595][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 749.402689][ T6056] Workqueue: usb_hub_wq hub_event [ 749.403769][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 749.405354][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 749.406355][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 749.407307][ T6056] sp : ffff800097356580 [ 749.408155][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 749.409817][ T6056] x26: 0000000000000001 x25: 1fffe0001b81d961 x24: dfff800000000000 [ 749.411471][ T6056] x23: ffff700012e6acb0 x22: ffff0000dc0ecb20 x21: ffff8000973565a0 [ 749.413140][ T6056] x20: 0000000000000001 x19: ffff0000dc0ecb08 x18: 1fffe00036842bc6 [ 749.414749][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: ffff0001b4215e3c [ 749.416410][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 749.418081][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 749.419738][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 749.421428][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 749.423089][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 749.424779][ T6056] Call trace: [ 749.425430][ T6056] __flush_work+0x1b4/0x1c0 [ 749.426375][ T6056] __cancel_work_timer+0x3e4/0x540 [ 749.427467][ T6056] cancel_work_sync+0x24/0x38 [ 749.428472][ T6056] smsusb_term_device+0x98/0x1cc [ 749.429431][ T6056] smsusb_probe+0xcb8/0x1a0c [ 749.430370][ T6056] usb_probe_interface+0x500/0x984 [ 749.431489][ T6056] really_probe+0x394/0xa7c [ 749.432344][ T6056] __driver_probe_device+0x194/0x3b4 [ 749.433528][ T6056] driver_probe_device+0x78/0x330 [ 749.434526][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 749.435607][ T6056] bus_for_each_drv+0x228/0x2bc [ 749.436648][ T6056] __device_attach+0x2b4/0x434 [ 749.437635][ T6056] device_initial_probe+0x24/0x34 [ 749.438782][ T6056] bus_probe_device+0x178/0x240 [ 749.439721][ T6056] device_add+0xa44/0xdf0 [ 749.440619][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 749.441735][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 749.442900][ T6056] usb_probe_device+0x120/0x25c [ 749.443917][ T6056] really_probe+0x394/0xa7c [ 749.444821][ T6056] __driver_probe_device+0x194/0x3b4 [ 749.445931][ T6056] driver_probe_device+0x78/0x330 [ 749.446909][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 749.448080][ T6056] bus_for_each_drv+0x228/0x2bc [ 749.449078][ T6056] __device_attach+0x2b4/0x434 [ 749.450090][ T6056] device_initial_probe+0x24/0x34 [ 749.451134][ T6056] bus_probe_device+0x178/0x240 [ 749.452162][ T6056] device_add+0xa44/0xdf0 [ 749.453036][ T6056] usb_new_device+0x904/0x142c [ 749.454123][ T6056] hub_event+0x25e4/0x474c [ 749.455048][ T6056] process_one_work+0x788/0x12d4 00:12:29 executing program 3: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0xe, &(0x7f0000000440)={&(0x7f0000000300)=@upd={0xe0, 0x10, 0x1597, 0x0, 0x0, {{'ctr-twofish-3way\x00'}}}, 0xe0}}, 0x0) [ 749.456051][ T6056] worker_thread+0xb68/0xfe8 [ 749.457018][ T6056] kthread+0x288/0x310 [ 749.457916][ T6056] ret_from_fork+0x10/0x20 [ 749.458904][ T6056] irq event stamp: 2648872 [ 749.459842][ T6056] hardirqs last enabled at (2648871): [] __cancel_work_timer+0x3a4/0x540 [ 749.461978][ T6056] hardirqs last disabled at (2648872): [] el1_dbg+0x24/0x80 [ 749.463933][ T6056] softirqs last enabled at (2648864): [] __do_softirq+0xac0/0xd54 [ 749.465887][ T6056] softirqs last disabled at (2648435): [] ____do_softirq+0x14/0x20 [ 749.467925][ T6056] ---[ end trace 0000000000000000 ]--- [ 749.515300][ T6056] smsusb:smsusb_probe: Device initialized with return code -19 [ 749.550319][ T6056] smsusb:smsusb_probe: board id=12, interface number 93 [ 749.588093][ T6056] smsusb:smsusb_probe: board id=12, interface number 212 [ 749.590693][ T6056] usb 1-1: USB disconnect, device number 90 [ 749.946745][ T6056] usb 1-1: new high-speed USB device number 91 using dummy_hcd [ 750.187432][ T6056] usb 1-1: Using ep0 maxpacket: 16 [ 750.306785][ T6056] usb 1-1: config 5 has an invalid interface number: 93 but max is 2 [ 750.308516][ T6056] usb 1-1: config 5 has an invalid interface number: 212 but max is 2 [ 750.310123][ T6056] usb 1-1: config 5 has no interface number 1 [ 750.311402][ T6056] usb 1-1: config 5 has no interface number 2 [ 750.313550][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0xC has invalid maxpacket 1023, setting to 64 [ 750.315676][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0x2, skipping [ 750.317838][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0x7 has invalid maxpacket 512, setting to 64 [ 750.320062][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0xB, skipping [ 750.322185][ T6056] usb 1-1: config 5 interface 0 altsetting 5 endpoint 0x1 has invalid maxpacket 1024, setting to 64 [ 750.324408][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has a duplicate endpoint with address 0x2, skipping [ 750.326521][ T6056] usb 1-1: config 5 interface 0 altsetting 5 has an invalid endpoint with address 0x80, skipping [ 750.329164][ T6056] usb 1-1: config 5 interface 93 altsetting 7 endpoint 0xA has invalid maxpacket 511, setting to 64 [ 750.331415][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0xB, skipping [ 750.333655][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0x1, skipping [ 750.335832][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has an invalid endpoint with address 0x0, skipping [ 750.338016][ T6056] usb 1-1: config 5 interface 212 altsetting 1 has a duplicate endpoint with address 0x9, skipping [ 750.340245][ T6056] usb 1-1: config 5 interface 0 has no altsetting 0 [ 750.341596][ T6056] usb 1-1: config 5 interface 93 has no altsetting 0 [ 750.342988][ T6056] usb 1-1: config 5 interface 212 has no altsetting 0 [ 750.496773][ T6056] usb 1-1: Dual-Role OTG device on HNP port [ 750.517965][ T6056] usb 1-1: New USB device found, idVendor=187f, idProduct=0302, bcdDevice= 8.17 [ 750.519831][ T6056] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 750.521556][ T6056] usb 1-1: Product: syz [ 750.522422][ T6056] usb 1-1: Manufacturer: syz [ 750.523357][ T6056] usb 1-1: SerialNumber: syz [ 750.527628][ T6056] usb 1-1: Interface #212 referenced by multiple IADs [ 750.838010][ T6056] smsusb:smsusb_probe: board id=12, interface number 0 [ 751.026778][ T6056] ------------[ cut here ]------------ [ 751.028005][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 751.030016][ T6056] Modules linked in: [ 751.030848][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 751.033130][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 751.035175][ T6056] Workqueue: usb_hub_wq hub_event [ 751.036232][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 751.037823][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 751.038837][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 751.039870][ T6056] sp : ffff800097356580 [ 751.040706][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 751.042396][ T6056] x26: 0000000000000001 x25: 1fffe0001927b01d x24: dfff800000000000 [ 751.044060][ T6056] x23: ffff700012e6acb0 x22: ffff0000c93d8100 x21: ffff8000973565a0 [ 751.045694][ T6056] x20: 0000000000000001 x19: ffff0000c93d80e8 x18: 1fffe00036842bc6 [ 751.047368][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 751.048948][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 751.050555][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 751.052177][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 751.053824][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 751.055455][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 751.057142][ T6056] Call trace: [ 751.057815][ T6056] __flush_work+0x1b4/0x1c0 [ 751.058727][ T6056] __cancel_work_timer+0x3e4/0x540 [ 751.059826][ T6056] cancel_work_sync+0x24/0x38 [ 751.060808][ T6056] smsusb_term_device+0x98/0x1cc [ 751.061760][ T6056] smsusb_probe+0xcb8/0x1a0c [ 751.062665][ T6056] usb_probe_interface+0x500/0x984 [ 751.063672][ T6056] really_probe+0x394/0xa7c [ 751.064662][ T6056] __driver_probe_device+0x194/0x3b4 [ 751.065726][ T6056] driver_probe_device+0x78/0x330 [ 751.066738][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 751.067825][ T6056] bus_for_each_drv+0x228/0x2bc [ 751.068831][ T6056] __device_attach+0x2b4/0x434 [ 751.069845][ T6056] device_initial_probe+0x24/0x34 [ 751.070981][ T6056] bus_probe_device+0x178/0x240 [ 751.072084][ T6056] device_add+0xa44/0xdf0 [ 751.072963][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 751.074141][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 751.075290][ T6056] usb_probe_device+0x120/0x25c [ 751.076319][ T6056] really_probe+0x394/0xa7c [ 751.077267][ T6056] __driver_probe_device+0x194/0x3b4 [ 751.078404][ T6056] driver_probe_device+0x78/0x330 [ 751.079492][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 751.080554][ T6056] bus_for_each_drv+0x228/0x2bc [ 751.081565][ T6056] __device_attach+0x2b4/0x434 [ 751.082569][ T6056] device_initial_probe+0x24/0x34 [ 751.083589][ T6056] bus_probe_device+0x178/0x240 [ 751.084575][ T6056] device_add+0xa44/0xdf0 [ 751.085399][ T6056] usb_new_device+0x904/0x142c [ 751.086403][ T6056] hub_event+0x25e4/0x474c [ 751.087297][ T6056] process_one_work+0x788/0x12d4 [ 751.088345][ T6056] worker_thread+0xb68/0xfe8 [ 751.089367][ T6056] kthread+0x288/0x310 [ 751.090219][ T6056] ret_from_fork+0x10/0x20 [ 751.091147][ T6056] irq event stamp: 2661710 [ 751.092030][ T6056] hardirqs last enabled at (2661709): [] __cancel_work_timer+0x3a4/0x540 [ 751.094078][ T6056] hardirqs last disabled at (2661710): [] el1_dbg+0x24/0x80 [ 751.095966][ T6056] softirqs last enabled at (2659418): [] __do_softirq+0xac0/0xd54 [ 751.097965][ T6056] softirqs last disabled at (2659383): [] ____do_softirq+0x14/0x20 [ 751.100000][ T6056] ---[ end trace 0000000000000000 ]--- [ 751.102314][ T6056] ------------[ cut here ]------------ [ 751.103407][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 751.105191][ T6056] Modules linked in: [ 751.105984][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 751.108233][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 751.110340][ T6056] Workqueue: usb_hub_wq hub_event [ 751.111354][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 751.113035][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 751.114093][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 751.115057][ T6056] sp : ffff800097356580 [ 751.115900][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 751.117581][ T6056] x26: 0000000000000001 x25: 1fffe0001927b041 x24: dfff800000000000 [ 751.119345][ T6056] x23: ffff700012e6acb0 x22: ffff0000c93d8220 x21: ffff8000973565a0 [ 751.121015][ T6056] x20: 0000000000000001 x19: ffff0000c93d8208 x18: 1fffe00036842bc6 [ 751.122563][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 751.124203][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 751.125807][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 751.127514][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 751.129095][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 751.130822][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 751.132450][ T6056] Call trace: [ 751.133096][ T6056] __flush_work+0x1b4/0x1c0 [ 751.133991][ T6056] __cancel_work_timer+0x3e4/0x540 [ 751.135028][ T6056] cancel_work_sync+0x24/0x38 [ 751.136126][ T6056] smsusb_term_device+0x98/0x1cc [ 751.137147][ T6056] smsusb_probe+0xcb8/0x1a0c [ 751.138040][ T6056] usb_probe_interface+0x500/0x984 [ 751.139153][ T6056] really_probe+0x394/0xa7c [ 751.140060][ T6056] __driver_probe_device+0x194/0x3b4 [ 751.141192][ T6056] driver_probe_device+0x78/0x330 [ 751.142198][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 751.143268][ T6056] bus_for_each_drv+0x228/0x2bc [ 751.144272][ T6056] __device_attach+0x2b4/0x434 [ 751.145223][ T6056] device_initial_probe+0x24/0x34 [ 751.146241][ T6056] bus_probe_device+0x178/0x240 [ 751.147320][ T6056] device_add+0xa44/0xdf0 [ 751.148172][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 751.149360][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 751.150460][ T6056] usb_probe_device+0x120/0x25c [ 751.151409][ T6056] really_probe+0x394/0xa7c [ 751.152380][ T6056] __driver_probe_device+0x194/0x3b4 [ 751.153483][ T6056] driver_probe_device+0x78/0x330 [ 751.154443][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 751.155579][ T6056] bus_for_each_drv+0x228/0x2bc [ 751.156595][ T6056] __device_attach+0x2b4/0x434 [ 751.157561][ T6056] device_initial_probe+0x24/0x34 [ 751.158663][ T6056] bus_probe_device+0x178/0x240 [ 751.159682][ T6056] device_add+0xa44/0xdf0 [ 751.160580][ T6056] usb_new_device+0x904/0x142c [ 751.161562][ T6056] hub_event+0x25e4/0x474c [ 751.162474][ T6056] process_one_work+0x788/0x12d4 [ 751.163455][ T6056] worker_thread+0xb68/0xfe8 [ 751.164414][ T6056] kthread+0x288/0x310 [ 751.165287][ T6056] ret_from_fork+0x10/0x20 [ 751.166246][ T6056] irq event stamp: 2662128 [ 751.167195][ T6056] hardirqs last enabled at (2662127): [] __cancel_work_timer+0x3a4/0x540 [ 751.169230][ T6056] hardirqs last disabled at (2662128): [] el1_dbg+0x24/0x80 [ 751.171040][ T6056] softirqs last enabled at (2662120): [] __do_softirq+0xac0/0xd54 [ 751.173075][ T6056] softirqs last disabled at (2661713): [] ____do_softirq+0x14/0x20 [ 751.175066][ T6056] ---[ end trace 0000000000000000 ]--- [ 751.177270][ T6056] ------------[ cut here ]------------ [ 751.178342][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 751.180144][ T6056] Modules linked in: [ 751.180936][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 751.183305][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 751.185411][ T6056] Workqueue: usb_hub_wq hub_event [ 751.186495][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 751.188119][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 751.189110][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 751.190115][ T6056] sp : ffff800097356580 [ 751.191029][ T6056] x29: ffff8000973566b0 x28: 0000000000000000 x27: ffff8000973567e8 [ 751.192755][ T6056] x26: 0000000000000001 x25: 1fffe0001927b065 x24: dfff800000000000 [ 751.194465][ T6056] x23: ffff700012e6acb0 x22: ffff0000c93d8340 x21: ffff8000973565a0 [ 751.196105][ T6056] x20: 0000000000000001 x19: ffff0000c93d8328 x18: 1fffe00036842bc6 [ 751.197806][ T6056] x17: ffff80008deed000 x16: ffff80008a3953c0 x15: 0000000000000002 [ 751.199490][ T6056] x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000000001 [ 751.201146][ T6056] x11: 0000000000040000 x10: 000000000003ffff x9 : ffff8000a3cfb000 [ 751.202853][ T6056] x8 : 0000000000040000 x7 : 0000000000000000 x6 : 000000000000003f [ 751.204615][ T6056] x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : 0000000000000000 [ 751.206197][ T6056] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000 [ 751.207915][ T6056] Call trace: [ 751.208579][ T6056] __flush_work+0x1b4/0x1c0 [ 751.209530][ T6056] __cancel_work_timer+0x3e4/0x540 [ 751.210570][ T6056] cancel_work_sync+0x24/0x38 [ 751.211572][ T6056] smsusb_term_device+0x98/0x1cc [ 751.212528][ T6056] smsusb_probe+0xcb8/0x1a0c [ 751.213494][ T6056] usb_probe_interface+0x500/0x984 [ 751.214593][ T6056] really_probe+0x394/0xa7c [ 751.215546][ T6056] __driver_probe_device+0x194/0x3b4 [ 751.216631][ T6056] driver_probe_device+0x78/0x330 [ 751.217657][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 751.218772][ T6056] bus_for_each_drv+0x228/0x2bc [ 751.219778][ T6056] __device_attach+0x2b4/0x434 [ 751.220780][ T6056] device_initial_probe+0x24/0x34 [ 751.221817][ T6056] bus_probe_device+0x178/0x240 [ 751.222806][ T6056] device_add+0xa44/0xdf0 [ 751.223738][ T6056] usb_set_configuration+0x15cc/0x1b38 [ 751.224987][ T6056] usb_generic_driver_probe+0x8c/0x148 [ 751.226183][ T6056] usb_probe_device+0x120/0x25c [ 751.227170][ T6056] really_probe+0x394/0xa7c [ 751.228180][ T6056] __driver_probe_device+0x194/0x3b4 [ 751.229259][ T6056] driver_probe_device+0x78/0x330 [ 751.230317][ T6056] __device_attach_driver+0x2a8/0x4f4 [ 751.231365][ T6056] bus_for_each_drv+0x228/0x2bc [ 751.232400][ T6056] __device_attach+0x2b4/0x434 [ 751.233350][ T6056] device_initial_probe+0x24/0x34 [ 751.234334][ T6056] bus_probe_device+0x178/0x240 [ 751.235342][ T6056] device_add+0xa44/0xdf0 [ 751.236214][ T6056] usb_new_device+0x904/0x142c [ 751.237234][ T6056] hub_event+0x25e4/0x474c [ 751.238212][ T6056] process_one_work+0x788/0x12d4 [ 751.239224][ T6056] worker_thread+0xb68/0xfe8 [ 751.240230][ T6056] kthread+0x288/0x310 [ 751.241044][ T6056] ret_from_fork+0x10/0x20 [ 751.241996][ T6056] irq event stamp: 2662560 [ 751.242882][ T6056] hardirqs last enabled at (2662559): [] __cancel_work_timer+0x3a4/0x540 [ 751.244971][ T6056] hardirqs last disabled at (2662560): [] el1_dbg+0x24/0x80 [ 751.246852][ T6056] softirqs last enabled at (2662552): [] __do_softirq+0xac0/0xd54 [ 751.248808][ T6056] softirqs last disabled at (2662131): [] ____do_softirq+0x14/0x20 [ 751.250700][ T6056] ---[ end trace 0000000000000000 ]--- [ 751.253005][ T6056] ------------[ cut here ]------------ [ 751.254104][ T6056] WARNING: CPU: 0 PID: 6056 at kernel/workqueue.c:3182 __flush_work+0x1b4/0x1c0 [ 751.255912][ T6056] Modules linked in: [ 751.256743][ T6056] CPU: 0 PID: 6056 Comm: kworker/0:3 Tainted: G W 6.4.0-rc7-syzkaller-ge40939bbfc68 #0 [ 751.258974][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 751.261057][ T6056] Workqueue: usb_hub_wq hub_event [ 751.262125][ T6056] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 751.263721][ T6056] pc : __flush_work+0x1b4/0x1c0 [ 751.264667][ T6056] lr : __flush_work+0x1b0/0x1c0 [ 751.265733][ T6056] sp : ffff800097356580